We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54139

HAX CMS' application pages are vulnerable to clickjacking



Description

HAX CMS allows users to manage their microsite universe with a NodeJS or PHP backend. In haxcms-nodejs versions 11.0.12 and below and in haxcms-php versions 11.0.7 and below, all pages within the HAX CMS application do not contain headers to prevent other websites from loading the site within an iframe. This applies to both the CMS and generated sites. An unauthenticated attacker can load the standalone login page or other sensitive functionality within an iframe, performing a UI redressing attack (clickjacking). This can be used to perform social engineering attacks to attempt to coerce users into performing unintended actions within the HAX CMS application. This is fixed in haxcms-nodejs version 11.0.13 and haxcms-php 11.0.8.

Reserved 2025-07-16 | Published 2025-07-22 | Updated 2025-07-22 | Assigner GitHub_M


MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Problem types

CWE-1021: Improper Restriction of Rendered UI Layers or Frames

Product status

< 11.0.13
affected

< 11.0.8
affected

References

github.com/...issues/security/advisories/GHSA-54vw-f4xf-f92j

github.com/...ommit/777f9a7ff9675a160496f350d766df1f1f9b9b99

github.com/...ommit/708dc8518928fe307044e67bff8b0f397cfdd606

cve.org (CVE-2025-54139)

nvd.nist.gov (CVE-2025-54139)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54139

Support options

Helpdesk Chat, Email, Knowledgebase