Publicly Accessible Endpoint in HAX CMS Exposes Sensitive Information
CVE-2026-35185

8.7HIGH

Key Information:

Vendor

Haxtheweb

Status
Vendor
CVE Published:
6 April 2026

What is CVE-2026-35185?

HAX CMS, a tool for managing microsites with PHP or NodeJs backends, has a vulnerability where the /server-status endpoint is publicly accessible before version 25.0.0. This exposure allows unauthorized users to access sensitive information including authentication tokens, user activity, client IP addresses, and server configuration details. Consequently, attackers can monitor real-time user interactions and gather critical internal infrastructure insights. This issue has been addressed in version 25.0.0.

Affected Version(s)

HAXiam < 25.0.0

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.