Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-v3ph-2q5q-cg88: @haxtheweb/haxcms-nodejs Iframe Phishing vulnerability

Summary

In the HAX site editor, users can create a website block to load another site in an iframe. The application allows users to supply a target URL in the website block. When the HAX site is visited, the client’s browser will query the supplied URL.

Affected Resources

PoC

  1. Set the URL in an iframe pointing to an attacker-controlled server running Responder

image

  1. Once another user visits the site, they are prompted to sign in.

image

  1. If a user inputs credentials, the username and password hash are outputted in Responder.

image

Impact

An authenticated attacker can create a HAX site with a website block pointing at an attacker-controlled server running Responder or a similar tool. The attacker can then conduct a phishing attack by convincing another user to visit their malicious HAX site to harvest credentials.

ghsa
#vulnerability#web#nodejs#js#git#php#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-49139

@haxtheweb/haxcms-nodejs Iframe Phishing vulnerability

Moderate severity GitHub Reviewed Published Jun 9, 2025 in haxtheweb/issues • Updated Jun 9, 2025

Package

npm @haxtheweb/haxcms-nodejs (npm)

Affected versions

< 11.0.0

Summary

In the HAX site editor, users can create a website block to load another site in an iframe. The application allows users to supply a target URL in the website block. When the HAX site is visited, the client’s browser will query the supplied URL.

Affected Resources

  • Operations.php:868
  • https://<site>/<user>/system/api/saveNode

PoC

  1. Set the URL in an iframe pointing to an attacker-controlled server running Responder

  2. Once another user visits the site, they are prompted to sign in.

  3. If a user inputs credentials, the username and password hash are outputted in Responder.

Impact

An authenticated attacker can create a HAX site with a website block pointing at an attacker-controlled server running Responder or a similar tool. The attacker can then conduct a phishing attack by convincing another user to visit their malicious HAX site to harvest credentials.

References

  • GHSA-v3ph-2q5q-cg88
  • haxtheweb/haxcms-nodejs@5368eb9

Published to the GitHub Advisory Database

Jun 9, 2025

ghsa: Latest News

GHSA-3m86-c9x3-vwm9: Graylog vulnerable to privilege escalation through API tokens