<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Haxcms-Nodejs (&lt;= 25.0.0) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/haxcms-nodejs--25.0.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 14:48:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/haxcms-nodejs--25.0.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>HAXcms Cross-Tenant Account Takeover via Stored XSS and Token Exposure</title><link>https://feed.craftedsignal.io/briefs/2026-05-haxcms-token-exfil/</link><pubDate>Tue, 19 May 2026 14:48:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-haxcms-token-exfil/</guid><description>HAXcms is vulnerable to stored XSS and exposes authentication tokens in the `/system/api/connectionSettings` endpoint, allowing an attacker to perform cross-tenant account takeover by injecting malicious JavaScript to steal the `jwt`, `user_token`, `site_token`, and `appstore_token`.</description><content:encoded><![CDATA[<p>HAXcms is vulnerable to a critical account takeover vulnerability stemming from a combination of stored XSS and insecure token handling. The vulnerability, present in versions 25.0.0 and earlier, allows an authenticated attacker to inject malicious JavaScript code into a page that, when viewed by another user, exfiltrates that user&rsquo;s authentication tokens. The <code>/system/api/connectionSettings</code> endpoint dynamically leaks sensitive tokens into a global JavaScript variable (<code>window.appSettings</code>), which can be accessed and stolen via XSS. This vulnerability allows for complete cross-tenant account hijacking, enabling attackers to perform administrative actions without needing the victim&rsquo;s password.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the HAXcms application with valid credentials.</li>
<li>Attacker injects malicious JavaScript code via a stored XSS vulnerability, such as within an iframe&rsquo;s <code>srcdoc</code> or through a <code>&lt;video-player&gt;</code> tag, on a page they have write access to.</li>
<li>The victim user views the compromised page.</li>
<li>The injected JavaScript executes in the victim&rsquo;s browser context.</li>
<li>The JavaScript fetches the victim&rsquo;s connection settings via <code>fetch('/&lt;username&gt;/system/api/connectionSettings')</code>, which includes the victim&rsquo;s valid JWT and tokens.</li>
<li>The JavaScript parses the <code>jwt</code>, <code>user_token</code>, <code>site_token</code>, and <code>appstore_token</code> from the response.</li>
<li>The JavaScript encodes the stolen tokens (including <code>jwt</code>, <code>user_token</code>, <code>site_token</code>, and <code>appstore_token</code>) using Base64 encoding.</li>
<li>The JavaScript exfiltrates the encoded tokens to an attacker-controlled webhook using an image request to bypass CORS. The attacker now has the ability to impersonate the victim and perform administrative actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows for complete account hijacking. An attacker who successfully exploits this vulnerability can impersonate a victim user without needing their password. This gives the attacker the ability to perform malicious administrative actions, such as creating or deleting sites, modifying user access, and uploading malicious content. The reliance on <code>window.appSettings</code> for storing long-lived administrative tokens creates a critical vulnerability when combined with XSS.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect HAXcms Connection Settings Request</code> to detect requests to the <code>/system/api/connectionSettings</code> endpoint from unusual sources, and tune for your environment.</li>
<li>Deploy the Sigma rule <code>Detect HAXcms Token Exfiltration via Webhook</code> to detect attempts to exfiltrate the tokens to external webhooks.</li>
<li>Ensure that all HAXcms instances are updated to a patched version that addresses this vulnerability to prevent CVE-2026-46511 exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>haxcms</category><category>xss</category><category>account-takeover</category></item></channel></rss>