GHSA-v3ph-2q5q-cg88

Suggest an improvement
Source
https://github.com/advisories/GHSA-v3ph-2q5q-cg88
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-v3ph-2q5q-cg88/GHSA-v3ph-2q5q-cg88.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v3ph-2q5q-cg88
Aliases
Related
Published
2025-06-09T19:07:21Z
Modified
2025-06-09T21:44:07Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
@haxtheweb/haxcms-nodejs Iframe Phishing vulnerability
Details

Summary

In the HAX site editor, users can create a website block to load another site in an iframe. The application allows users to supply a target URL in the website block. When the HAX site is visited, the client's browser will query the supplied URL.

Affected Resources

PoC

  1. Set the URL in an iframe pointing to an attacker-controlled server running Responder

image

  1. Once another user visits the site, they are prompted to sign in.

image

  1. If a user inputs credentials, the username and password hash are outputted in Responder.

image

Impact

An authenticated attacker can create a HAX site with a website block pointing at an attacker-controlled server running Responder or a similar tool. The attacker can then conduct a phishing attack by convincing another user to visit their malicious HAX site to harvest credentials.

Database specific
{
    "github_reviewed_at": "2025-06-09T19:07:21Z",
    "cwe_ids": [
        "CWE-1021"
    ],
    "nvd_published_at": "2025-06-09T21:15:47Z",
    "severity": "MODERATE",
    "github_reviewed": true
}
References

Affected packages

npm / @haxtheweb/haxcms-nodejs

Package

Name
@haxtheweb/haxcms-nodejs
View open source insights on deps.dev
Purl
pkg:npm/%40haxtheweb/haxcms-nodejs

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
11.0.0