We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54134

HAX CMS NodeJs's Improper Error Handling Leads to Denial of Service



Description

HAX CMS NodeJs allows users to manage their microsite universe with a NodeJs backend. In versions 11.0.8 and below, the HAX CMS NodeJS application crashes when an authenticated attacker provides an API request lacking required URL parameters. This vulnerability affects the listFiles and saveFiles endpoints. This vulnerability exists because the application does not properly handle exceptions which occur as a result of changes to user-modifiable URL parameters. This is fixed in version 11.0.9.

Reserved 2025-07-16 | Published 2025-07-21 | Updated 2025-07-21 | Assigner GitHub_M


HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-20: Improper Input Validation

CWE-248: Uncaught Exception

CWE-703: Improper Check or Handling of Exceptional Conditions

Product status

< 11.0.9
affected

References

github.com/...issues/security/advisories/GHSA-pjj3-j5j6-qj27

github.com/...ommit/e9773d1996233f9bafb06832b8220ec2a98bab34

github.com/...axcms-nodejs/blob/main/src/routes/listFiles.js

github.com/...haxcms-nodejs/blob/main/src/routes/saveFile.js

cve.org (CVE-2025-54134)

nvd.nist.gov (CVE-2025-54134)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54134

Support options

Helpdesk Chat, Email, Knowledgebase