Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f38f-jvqj-mfg6

Опубликовано: 21 июл. 2025
Источник: github
Github: Прошло ревью
CVSS4: 9.3

Описание

NodeJS version of HAX CMS Has Insecure Default Configuration That Leads to Unauthenticated Access

Summary

The NodeJS version of HAX CMS uses an insecure default configuration designed for local development. The default configuration does not perform authorization or authentication checks.

Details

If a user were to deploy haxcms-nodejs without modifying the default settings, ‘HAXCMS_DISABLE_JWT_CHECKS‘ would be set to ‘true‘ and their deployment would lack session authentication.

insecure-default-configuration-code

Affected Resources

PoC

To reproduce this vulnerability, install HAX CMS NodeJS. The application will load without JWT checks enabled.

Impact

Without security checks in place, an unauthenticated remote attacker could access, modify, and delete all site information.

Пакеты

Наименование

@haxtheweb/haxcms-nodejs

npm
Затронутые версииВерсия исправления

<= 11.0.6

11.0.7

EPSS

Процентиль: 24%
0.00082
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-1188

Связанные уязвимости

CVSS3: 9.8
nvd
7 месяцев назад

HAXcms with nodejs backend allows users to start the server in any HAXsite or HAXcms instance. In versions 11.0.6 and below, the NodeJS version of HAXcms uses an insecure default configuration designed for local development. The default configuration does not perform authorization or authentication checks. If a user were to deploy haxcms-nodejs without modifying the default settings, ‘HAXCMS_DISABLE_JWT_CHECKS‘ would be set to ‘true‘ and their deployment would lack session authentication. This is fixed in version 11.0.7.

EPSS

Процентиль: 24%
0.00082
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-1188