HAX CMS PHP allows you to manage your microsite universe with PHP backend. Multiple file upload functions within the HAX CMS PHP application call a ’save’ function in ’HAXCMSFile.php’. This save function uses a denylist to block specific file types from being uploaded to the server. This list is non-exhaustive and only blocks ’.php’, ’.sh’, ’.js’, and ’.css’ files. The existing logic causes the system to "fail open" rather than "fail closed." This vulnerability is fixed in 10.0.3.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Jul 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Psu
Psu haxcms-php |
|
| CPEs | cpe:2.3:a:psu:haxcms-php:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Haxtheweb
Haxtheweb hax |
Psu
Psu haxcms-php |
Wed, 18 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Haxtheweb
Haxtheweb hax |
|
| CPEs | cpe:2.3:a:haxtheweb:hax:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Haxtheweb
Haxtheweb hax |
Tue, 08 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HAX CMS PHP allows you to manage your microsite universe with PHP backend. Multiple file upload functions within the HAX CMS PHP application call a ’save’ function in ’HAXCMSFile.php’. This save function uses a denylist to block specific file types from being uploaded to the server. This list is non-exhaustive and only blocks ’.php’, ’.sh’, ’.js’, and ’.css’ files. The existing logic causes the system to "fail open" rather than "fail closed." This vulnerability is fixed in 10.0.3. | |
| Title | HAX CMS PHP allows Insecure File Upload to Lead to Remote Code Execution | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-08T20:00:56.916Z
Reserved: 2025-04-01T21:57:32.957Z
Link: CVE-2025-32028
Updated: 2025-04-08T20:00:49.026Z
Status : Analyzed
Published: 2025-04-08T16:15:28.180
Modified: 2025-07-30T17:36:18.587
Link: CVE-2025-32028
No data.