Headline
GHSA-v3ph-2q5q-cg88: @haxtheweb/haxcms-nodejs Iframe Phishing vulnerability
Summary
In the HAX site editor, users can create a website block to load another site in an iframe. The application allows users to supply a target URL in the website block. When the HAX site is visited, the client’s browser will query the supplied URL.
Affected Resources
- Operations.php:868
https://<site>/<user>/system/api/saveNode
PoC
- Set the URL in an iframe pointing to an attacker-controlled server running Responder
- Once another user visits the site, they are prompted to sign in.
- If a user inputs credentials, the username and password hash are outputted in Responder.
Impact
An authenticated attacker can create a HAX site with a website block pointing at an attacker-controlled server running Responder or a similar tool. The attacker can then conduct a phishing attack by convincing another user to visit their malicious HAX site to harvest credentials.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-49139
@haxtheweb/haxcms-nodejs Iframe Phishing vulnerability
Moderate severity GitHub Reviewed Published Jun 9, 2025 in haxtheweb/issues • Updated Jun 9, 2025
Package
npm @haxtheweb/haxcms-nodejs (npm)
Affected versions
< 11.0.0
Summary
In the HAX site editor, users can create a website block to load another site in an iframe. The application allows users to supply a target URL in the website block. When the HAX site is visited, the client’s browser will query the supplied URL.
Affected Resources
- Operations.php:868
- https://<site>/<user>/system/api/saveNode
PoC
Set the URL in an iframe pointing to an attacker-controlled server running Responder
Once another user visits the site, they are prompted to sign in.
If a user inputs credentials, the username and password hash are outputted in Responder.
Impact
An authenticated attacker can create a HAX site with a website block pointing at an attacker-controlled server running Responder or a similar tool. The attacker can then conduct a phishing attack by convincing another user to visit their malicious HAX site to harvest credentials.
References
- GHSA-v3ph-2q5q-cg88
- haxtheweb/haxcms-nodejs@5368eb9
Published to the GitHub Advisory Database
Jun 9, 2025