CVE-2025-48996

5.3 MEDIUM

📋 TL;DR

An unauthenticated information disclosure vulnerability in HAX open-apis allows remote attackers to retrieve a full list of PSU websites hosted on HAX CMS. This affects Penn State University deployments using open-apis versions up to 10.0.2. When combined with other authorization issues, this could facilitate targeted attacks like unauthorized content modification.

💻 Affected Systems

Products:
  • HAX open-apis
Versions: up to and including 10.0.2
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects Penn State University deployments of HAX CMS using the vulnerable open-apis component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers combine this information disclosure with other vulnerabilities (like HAX-3) to perform unauthorized content modification or deletion across multiple websites.

🟠

Likely Case

Attackers gather intelligence about PSU websites hosted on HAX CMS for reconnaissance and potential targeted attacks.

🟢

If Mitigated

Information disclosure limited to website enumeration without ability to modify content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Direct API call to haxPsuUsage endpoint without authentication required. Chaining with other vulnerabilities increases impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 06c2e1fbb7131a8fe66aa0600f38dcacae6b7ac7

Vendor Advisory: https://github.com/haxtheweb/issues/security/advisories/GHSA-fvx2-x7ff-fc56

Restart Required: Yes

Instructions:

1. Update HAX open-apis to version after commit 06c2e1fbb7131a8fe66aa0600f38dcacae6b7ac7. 2. Restart affected services. 3. Verify the haxPsuUsage endpoint now requires proper authentication.

🔧 Temporary Workarounds

Block unauthenticated access to haxPsuUsage endpoint

all

Configure web server or firewall to block unauthenticated requests to the vulnerable API endpoint

# Example for nginx: location ~* /haxPsuUsage { deny all; }
# Example for Apache: <Location /haxPsuUsage> Require valid-user </Location>

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate HAX CMS from untrusted networks
  • Deploy WAF rules to block unauthenticated requests to haxPsuUsage endpoint

🔍 How to Verify

Check if Vulnerable:

Send unauthenticated GET request to /haxPsuUsage endpoint. If it returns website list without authentication, system is vulnerable.

Check Version:

Check package.json or version file in open-apis installation directory

Verify Fix Applied:

Attempt unauthenticated GET request to /haxPsuUsage endpoint. Should return authentication error or 403 Forbidden.

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of requests to /haxPsuUsage endpoint
  • Unauthenticated requests to /haxPsuUsage returning 200 OK

Network Indicators:

  • Unusual traffic patterns to HAX CMS API endpoints from external IPs

SIEM Query:

source="web_server" AND (uri="/haxPsuUsage" OR uri="/api/haxPsuUsage") AND response_code=200 AND user="-"

🔗 References

📤 Share & Export