<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>HAXcms (&lt;= 25.0.0) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/haxcms--25.0.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 14:44:52 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/haxcms--25.0.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>HAXcms createSite SSRF Enables Arbitrary File Read</title><link>https://feed.craftedsignal.io/briefs/2026-05-haxcms-ssrf/</link><pubDate>Tue, 19 May 2026 14:44:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-haxcms-ssrf/</guid><description>HAXcms is vulnerable to Server-Side Request Forgery (SSRF) via the createSite endpoint, allowing an authenticated user to supply arbitrary URLs or local file paths, which are fetched server-side without validation and written to a web-accessible directory, enabling arbitrary file read, internal network access, and cloud credential exposure; this vulnerability is tracked as CVE-2026-46393.</description><content:encoded><![CDATA[<p>HAXcms (v11.0.6) is vulnerable to Server-Side Request Forgery (SSRF) via the <code>createSite</code> endpoint due to insufficient validation of the <code>build.files</code> parameter. An authenticated user can supply arbitrary URLs or local file paths, which are then fetched server-side using <code>file_get_contents()</code> without validation. This allows for reading arbitrary files, accessing internal network services, and potentially exposing cloud credentials through metadata endpoints. This vulnerability was disclosed in GHSA-q862-gcgq-5m6g and is tracked as CVE-2026-46393. Exploitation requires an authenticated session, but default credentials are often present on fresh installs, lowering the barrier to entry.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the HAXcms application using credentials (default <code>admin/admin</code> may work on fresh installs).</li>
<li>The attacker obtains a valid JWT and CSRF token from the authenticated session.</li>
<li>The attacker crafts a POST request to the <code>/createSite</code> endpoint with a JSON payload.</li>
<li>The payload includes a <code>build.files</code> parameter containing a filename (e.g., <code>poc.txt</code>) as the key and a <code>tmp_name</code> value set to the target URL or file path (e.g., <code>http://169.254.169.254/latest/meta-data/iam/security-credentials/</code> or <code>/etc/passwd</code>).</li>
<li>The HAXcms server processes the <code>build.files</code> parameter, extracting the <code>tmp_name</code> value without validation.</li>
<li>The server uses <code>file_get_contents()</code> to fetch the content from the URL or file path specified in <code>tmp_name</code>.</li>
<li>The fetched content is saved to the <code>sites/&lt;sitename&gt;/files/&lt;filename&gt;</code> directory.</li>
<li>The attacker retrieves the content by sending a GET request to <code>sites/&lt;sitename&gt;/files/&lt;filename&gt;</code>, thus achieving arbitrary file read or access to internal resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This SSRF vulnerability can be exploited by any authenticated user to access sensitive information. Successful exploitation allows attackers to read arbitrary files from the server&rsquo;s file system (e.g., <code>/etc/passwd</code>, application configuration files), access internal network services, and potentially expose cloud credentials through metadata endpoints like <code>http://169.254.169.254</code>. This could lead to complete compromise of the server and potentially the associated cloud environment. The affected package <code>npm/@haxtheweb/haxcms-nodejs</code> (vulnerable: &lt;= 25.0.0) means that many instances of HAXcms may be affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates to HAXcms to address CVE-2026-46393.</li>
<li>Monitor web server logs for POST requests to <code>/createSite</code> with suspicious URLs or file paths in the <code>build.files</code> parameter, using the Sigma rule <code>Detect HAXcms createSite SSRF Attempt</code>.</li>
<li>Inspect network connections originating from the HAXcms server for connections to internal IP addresses or cloud metadata endpoints like 169.254.169.254, as highlighted in the IOC section.</li>
<li>Implement strict input validation on the <code>build.files</code> parameter of the <code>/createSite</code> endpoint to prevent arbitrary URL and file path injection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>haxcms</category><category>cve-2026-46393</category><category>vulnerability</category></item></channel></rss>