Home

Description

HAX CMS helps manage microsite universe with PHP or NodeJs backends. Prior to 25.0.0, the /server-status endpoint is publicly accessible and exposes sensitive information including authentication tokens (user_token), user activity, client IP addresses, and server configuration details. This allows any unauthenticated user to monitor real-time user interactions and gather internal infrastructure information. This vulnerability is fixed in 25.0.0.

PUBLISHED Reserved 2026-04-01 | Published 2026-04-06 | Updated 2026-04-07 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-284: Improper Access Control

CWE-522: Insufficiently Protected Credentials

CWE-532: Insertion of Sensitive Information into Log File

Product status

< 25.0.0
affected

References

github.com/...issues/security/advisories/GHSA-3676-wj6r-hwh7 exploit

github.com/...issues/security/advisories/GHSA-3676-wj6r-hwh7

cve.org (CVE-2026-35185)

nvd.nist.gov (CVE-2026-35185)

Download JSON