HAXiam is a packaging wrapper for HAXcms which allows anyone to spawn their own microsite management platform. In versions 11.0.4 and below, the application returns a 200 response when requesting the data of a valid user and a 404 response when requesting the data of an invalid user. This can be used to infer the existence of valid user accounts. An authenticated attacker can use automated tooling to brute force potential usernames and use the application's response to identify valid accounts. This can be used in conjunction with other vulnerabilities, such as the lack of authorization checks, to enumerate and deface another user's sites. This is fixed in version 11.0.5.
History

Wed, 23 Jul 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Haxtheweb
Haxtheweb hax
Vendors & Products Haxtheweb
Haxtheweb hax

Tue, 22 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 21 Jul 2025 21:00:00 +0000

Type Values Removed Values Added
Description HAXiam is a packaging wrapper for HAXcms which allows anyone to spawn their own microsite management platform. In versions 11.0.4 and below, the application returns a 200 response when requesting the data of a valid user and a 404 response when requesting the data of an invalid user. This can be used to infer the existence of valid user accounts. An authenticated attacker can use automated tooling to brute force potential usernames and use the application's response to identify valid accounts. This can be used in conjunction with other vulnerabilities, such as the lack of authorization checks, to enumerate and deface another user's sites. This is fixed in version 11.0.5.
Title HAXiam allows for User Enumeration
Weaknesses CWE-204
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-07-21T20:53:26.575Z

Updated: 2025-07-22T20:44:14.038Z

Reserved: 2025-07-16T23:53:40.509Z

Link: CVE-2025-54129

cve-icon Vulnrichment

Updated: 2025-07-22T20:44:10.568Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-21T21:15:26.710

Modified: 2025-07-22T13:05:40.573

Link: CVE-2025-54129

cve-icon Redhat

No data.