FKIE_CVE-2025-54129

Vulnerability from fkie_nvd - Published: 2025-07-21 21:15 - Updated: 2025-08-22 15:21
Summary
HAXiam is a packaging wrapper for HAXcms which allows anyone to spawn their own microsite management platform. In versions 11.0.4 and below, the application returns a 200 response when requesting the data of a valid user and a 404 response when requesting the data of an invalid user. This can be used to infer the existence of valid user accounts. An authenticated attacker can use automated tooling to brute force potential usernames and use the application's response to identify valid accounts. This can be used in conjunction with other vulnerabilities, such as the lack of authorization checks, to enumerate and deface another user's sites. This is fixed in version 11.0.5.
Impacted products
Vendor Product Version
psu haxiam *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:psu:haxiam:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB00C91-D60A-4149-902D-E594CF376892",
              "versionEndExcluding": "11.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "HAXiam is a packaging wrapper for HAXcms which allows anyone to spawn their own microsite management platform. In versions 11.0.4 and below, the application returns a 200 response when requesting the data of a valid user and a 404 response when requesting the data of an invalid user. This can be used to infer the existence of valid user accounts. An authenticated attacker can use automated tooling to brute force potential usernames and use the application\u0027s response to identify valid accounts. This can be used in conjunction with other vulnerabilities, such as the lack of authorization checks, to enumerate and deface another user\u0027s sites. This is fixed in version 11.0.5."
    },
    {
      "lang": "es",
      "value": "HAXiam es un envoltorio de empaquetado para HAXcms que permite a cualquiera crear su propia plataforma de gesti\u00f3n de micrositios. En las versiones 11.0.4 y anteriores, la aplicaci\u00f3n devuelve una respuesta 200 al solicitar los datos de un usuario v\u00e1lido y una respuesta 404 al solicitar los datos de un usuario no v\u00e1lido. Esto permite inferir la existencia de cuentas de usuario v\u00e1lidas. Un atacante autenticado puede usar herramientas automatizadas para forzar nombres de usuario potenciales y usar la respuesta de la aplicaci\u00f3n para identificar cuentas v\u00e1lidas. Esto puede combinarse con otras vulnerabilidades, como la falta de comprobaciones de autorizaci\u00f3n, para enumerar y desfigurar los sitios de otros usuarios. Esto se ha corregido en la versi\u00f3n 11.0.5."
    }
  ],
  "id": "CVE-2025-54129",
  "lastModified": "2025-08-22T15:21:08.543",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-07-21T21:15:26.710",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-wh3h-vfcv-m5g5"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-204"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…