GHSA-2m6p-hm3w-6jm3Medium
HAX CMS: Stored XSS via '<video-player>' component allows arbitrary JavaScript execution and token theft
🔗 CVE IDs covered (1)
📋 Description
### Summary
A stored cross-site scripting (XSS) vulnerability exists in HAX CMS due to improper sanitization of the `<video-player>` component.
The component allows `javascript:` URIs in the `source` attribute, which are executed when the page is viewed. This enables attackers to execute arbitrary JavaScript in the context of the victim’s browser and access sensitive data such as JWT tokens and more.
### Details
The vulnerability is present in the `<video-player>` web component used within the HAX CMS editor.
The application fails to validate or sanitize user-supplied input in the following attributes:
- `source`
- `source-data`
These attributes accept arbitrary URI schemes, including `javascript:`, which leads to execution of attacker-controlled JavaScript in the browser.
Example vulnerable usage:
```html
<video-player
source="javascript:alert(document.domain)"
source-type="external">
</video-player>
```
Because this content is stored and rendered to other users, the vulnerability is classified as a stored XSS.
The root cause is the lack of URI scheme validation and improper sanitization of component attributes before rendering.
Because this content is stored and rendered to other users, the vulnerability is classified as a stored XSS.
The root cause is the lack of URI scheme validation and improper sanitization of component attributes before rendering.
### PoC
Steps to reproduce:
1. Log in to HAX CMS as user.
2. Create a website or any page and switch to the HTML source editor (`<>`).
3. Insert the following payload:
```html
<video-player source="javascript:alert('JWT: '+localStorage.getItem('jwt').substring(0,30))" source-type="external"></video-player>
```
<img width="2456" height="1405" alt="image" src="https://github.com/user-attachments/assets/ea037043-7ff7-4840-bed0-1091692c6289" />
Save the page.
Reload or revisit or send the page.
Result
<img width="2468" height="1394" alt="image" src="https://github.com/user-attachments/assets/543bbf69-900d-4e2d-bd6b-0658fb5aa899" />
A JavaScript alert executes.
The JWT token is exposed.
This confirms arbitrary JavaScript execution in the victim’s browser.
### Impact
This vulnerability allows stored XSS leading to:
- Theft of JWT authentication tokens
- Session hijacking
- Full account takeover
- Execution of arbitrary JavaScript in victim browsers
If an administrator views a malicious page, this can lead to full CMS compromise.
Attack complexity: Low
Privileges required: Low (any authenticated user)
User interaction: Required
🎯 Affected products2
- npm/@haxtheweb/haxcms-nodejs:<= 25.0.0
- npm/@haxtheweb/video-player:<= 25.0.0