CVE-2026-35185
HIGHHAX CMS's public /server-status endpoint exposes authentication tokens, user activity, and client IP addresses
Title source: cnaDescription
HAX CMS helps manage microsite universe with PHP or NodeJs backends. Prior to 25.0.0, the /server-status endpoint is publicly accessible and exposes sensitive information including authentication tokens (user_token), user activity, client IP addresses, and server configuration details. This allows any unauthenticated user to monitor real-time user interactions and gather internal infrastructure information. This vulnerability is fixed in 25.0.0.
Scores
CVSS v3
7.5
EPSS
0.0007
EPSS Percentile
21.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-284
CWE-522
CWE-532
Status
published
Products (2)
haxtheweb/HAXiam
< 25.0.0
psu/haxiam
11.0.5
Published
Apr 06, 2026
Tracked Since
Apr 07, 2026