CVE-2026-35185

HIGH

HAX CMS's public /server-status endpoint exposes authentication tokens, user activity, and client IP addresses

Title source: cna
STIX 2.1

Description

HAX CMS helps manage microsite universe with PHP or NodeJs backends. Prior to 25.0.0, the /server-status endpoint is publicly accessible and exposes sensitive information including authentication tokens (user_token), user activity, client IP addresses, and server configuration details. This allows any unauthenticated user to monitor real-time user interactions and gather internal infrastructure information. This vulnerability is fixed in 25.0.0.

Scores

CVSS v3 7.5
EPSS 0.0007
EPSS Percentile 21.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-284 CWE-522 CWE-532
Status published
Products (2)
haxtheweb/HAXiam < 25.0.0
psu/haxiam 11.0.5
Published Apr 06, 2026
Tracked Since Apr 07, 2026