CVE-2025-49141

8.5 HIGH

📋 TL;DR

CVE-2025-49141 is an OS command injection vulnerability in HAX CMS PHP's gitImportSite functionality. Authenticated attackers can execute arbitrary commands on the backend server by crafting malicious URLs that bypass input validation. This affects all HAX CMS PHP installations prior to version 11.0.3.

💻 Affected Systems

Products:
  • HAX CMS PHP
Versions: All versions prior to 11.0.3
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to the gitImportSite functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing data exfiltration, lateral movement, ransomware deployment, or complete system takeover.

🟠

Likely Case

Unauthorized data access, privilege escalation, backdoor installation, or service disruption.

🟢

If Mitigated

Limited impact due to network segmentation, minimal user privileges, and proper input validation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses simple command injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.0.3

Vendor Advisory: https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw

Restart Required: No

Instructions:

1. Update HAX CMS PHP to version 11.0.3 or later. 2. Verify the patch is applied by checking the gitImportSite functionality. 3. Test the fix with safe input validation.

🔧 Temporary Workarounds

Disable gitImportSite functionality

all

Temporarily disable the vulnerable gitImportSite endpoint until patching is complete.

# Modify your HAX CMS configuration to disable gitImportSite
# Or use web server rules to block access to the endpoint

Implement input validation proxy

all

Add additional input validation layer before requests reach the vulnerable function.

# Add custom validation in your application middleware
# Example: Validate URL format and reject suspicious patterns

🧯 If You Can't Patch

  • Restrict access to authenticated users with minimal privileges only.
  • Implement network segmentation to isolate HAX CMS from critical systems.

🔍 How to Verify

Check if Vulnerable:

Check if your HAX CMS PHP version is below 11.0.3 and if gitImportSite functionality is accessible.

Check Version:

Check HAX CMS PHP version in admin panel or configuration files.

Verify Fix Applied:

Confirm version is 11.0.3 or higher and test gitImportSite with safe input to ensure proper validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to gitImportSite endpoint
  • Suspicious command strings in server logs
  • Multiple failed validation attempts

Network Indicators:

  • Unexpected outbound connections from HAX CMS server
  • Command output being sent via HTTP requests

SIEM Query:

search 'POST /gitImportSite' AND (suspicious_command OR validation_bypass)

🔗 References

📤 Share & Export