logo

CVE-2025-54139 @haxtheweb/haxcms-nodejs

Package

Manager: npm
Name: @haxtheweb/haxcms-nodejs
Vulnerable Version: >=0 <11.0.13

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00052 pctl0.15899

Details

HAX CMS application pages vulnerable to clickjacking ### Summary All pages within the HAX CMS application do not contain headers to stop other websites from loading the site within an iframe. This applies to both the CMS and generated sites. ### PoC To replicate this vulnerability, load the target page in an iframe and observe the rendered content. ![image](https://github.com/user-attachments/assets/84526738-7101-4842-9bac-d33a41091600) ### Impact An unauthenticated attacker can load the standalone login page or other sensitive functionality within an iframe, performing a UI redressing attack (Clickjacking). This can be used to perform social engineering attacks to attempt to coerce users into performing unintended actions within the HAX CMS application.

Metadata

Created: 2025-07-21T21:12:44Z
Modified: 2025-07-23T13:37:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-54vw-f4xf-f92j/GHSA-54vw-f4xf-f92j.json
CWE IDs: ["CWE-1021"]
Alternative ID: GHSA-54vw-f4xf-f92j
Finding: F360
Auto approve: 1