CVE-2025-54137 – @haxtheweb/haxcms-nodejs
Package
Manager: npm
Name: @haxtheweb/haxcms-nodejs
Vulnerable Version: >=0 <11.0.10
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
EPSS: 0.00112 pctl0.30427
Details
NodeJS version of the HAX CMS application is distributed with Default Secrets ### Summary The NodeJS version of the HAX CMS application is distributed with hardcoded default credentials for the user and superuser accounts. Additionally, the application has default private keys for JWTs. Users aren't prompted to change credentials or secrets during installation, and there is no way to change them through the UI. ### Affected Resources - [HAXCMS.js](https://github.com/haxtheweb/haxcms-nodejs/blob/main/src/lib/HAXCMS.js#L1614) HAXCMSClass ### Impact An unauthenticated attacker can read the default user credentials and JWT private keys from the public haxtheweb GitHub repositories. These credentials and keys can be used to access unconfigured self-hosted instances of the application, modify sites, and perform further attacks.
Metadata
Created: 2025-07-21T19:53:51Z
Modified: 2025-07-23T13:36:55Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-5fpv-5qvh-7cf3/GHSA-5fpv-5qvh-7cf3.json
CWE IDs: ["CWE-1392"]
Alternative ID: GHSA-5fpv-5qvh-7cf3
Finding: F041
Auto approve: 1