CVE-2025-53642
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-11

Last updated on: 2025-08-22

Assigner: GitHub, Inc.

Description
haxcms-nodejs and haxcms-php are backends for HAXcms. The logout function within the application does not terminate a user's session or clear their cookies. Additionally, the application issues a refresh token when logging out. This vulnerability is fixed in 11.0.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-11
Last Modified
2025-08-22
Generated
2026-05-07
AI Q&A
2025-07-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
psu haxcms-nodejs to 11.0.6 (exc)
psu haxcms-php to 11.0.6 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-613 According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the logout function of haxcms-nodejs and haxcms-php backends for HAXcms. When a user logs out, the application fails to terminate the user's session or clear their cookies properly. Additionally, it issues a refresh token upon logout, which should not happen. This can allow unauthorized access or session persistence after logout. The issue is fixed in version 11.0.6.


How can this vulnerability impact me? :

Because the logout function does not properly terminate sessions or clear cookies and issues a refresh token on logout, an attacker or unauthorized user might be able to reuse the session or tokens to gain continued access to the application even after the user has logged out. This can lead to unauthorized access to user accounts and potentially sensitive information.


What immediate steps should I take to mitigate this vulnerability?

Upgrade haxcms-nodejs and haxcms-php to version 11.0.6 or later, as this version fixes the vulnerability related to improper session termination and refresh token issuance on logout.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart