Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. elmsln/haxcms
  4. ›
  5. CVE-2025-49137

CVE-2025-49137: Hax CMS Stored Cross-Site Scripting vulnerability

June 9, 2025

The application does not sufficiently sanitize user input, allowing for the execution of arbitrary JavaScript code. The ‘saveNode’ and ‘saveManifest’ endpoints take user input and store it in the JSON schema for the site. This content is then rendered in the generated HAX site.

Although the application does not allow users to supply a ‘script’ tag, it does allow the use of other HTML tags to run JavaScript.

References

  • github.com/advisories/GHSA-2vc4-3hx7-v7v7
  • github.com/haxtheweb/haxcms-php/commit/0dd3e98fe2fadd0793b667d4af2aac230980e0f8
  • github.com/haxtheweb/issues
  • github.com/haxtheweb/issues/security/advisories/GHSA-2vc4-3hx7-v7v7
  • nvd.nist.gov/vuln/detail/CVE-2025-49137

Code Behaviors & Features

Detect and mitigate CVE-2025-49137 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 11.0.0

Fixed versions

  • 11.0.0

Solution

Upgrade to version 11.0.0 or above.

Impact 8.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
  • CWE-87: Improper Neutralization of Alternate XSS Syntax

Source file

packagist/elmsln/haxcms/CVE-2025-49137.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:19:49 +0000.