Get-simple

Getsimple Cms

26 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 63.8%
  • Veröffentlicht 18.10.2022 15:15:10
  • Zuletzt bearbeitet 13.05.2025 20:15:23

GetSimple CMS v3.3.16 was discovered to contain a remote code execution (RCE) vulnerability via the edited_file parameter in admin/theme-edit.php.

Exploit
  • EPSS 0.19%
  • Veröffentlicht 27.04.2022 08:15:37
  • Zuletzt bearbeitet 21.11.2024 06:40:51

A vulnerability, which was classified as problematic, has been found in GetSimple CMS. Affected by this issue is the file /admin/edit.php of the Content Module. The manipulation of the argument post-content with an input like <script>alert(1)</script...

Exploit
  • EPSS 0.35%
  • Veröffentlicht 01.10.2020 14:15:15
  • Zuletzt bearbeitet 21.11.2024 05:16:08

GetSimple CMS 3.3.16 allows in parameter 'permalink' on the Settings page persistent Cross Site Scripting which is executed when you create and open a new page

Exploit
  • EPSS 16.92%
  • Veröffentlicht 01.09.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:14:07

A Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16, in the admin/index.php login portal webpage, allows remote attackers to execute JavaScript code in the client's browser and harvest login credentials after a client clicks...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 02.01.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 01:49:32

Multiple cross-site scripting (XSS) vulnerabilities in GetSimple CMS before 3.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to backup-edit.php; (2) title or (3) menu parameter to edit.php; or (4) path or (...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 15.09.2019 22:15:10
  • Zuletzt bearbeitet 21.11.2024 04:30:32

GetSimple CMS v3.3.15 has Persistent Cross-Site Scripting (XSS) in admin/theme-edit.php.

Exploit
  • EPSS 61.68%
  • Veröffentlicht 22.05.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:46

An issue was discovered in GetSimple CMS through 3.3.15. insufficient input sanitation in the theme-edit.php file allows upload of files with arbitrary content (PHP code, for example). This vulnerability is triggered by an authenticated user; however...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 31.12.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:40

There is Stored XSS in GetSimple CMS 3.3.12 via the admin/edit.php "post-menu" parameter, a related issue to CVE-2018-16325.

Exploit
  • EPSS 0.22%
  • Veröffentlicht 21.11.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:57:53

In GetSimpleCMS 3.3.15, admin/upload.php blocks .html uploads but Internet Explorer render HTML elements in a .eml file, because of admin/upload-uploadify.php, and validate_safe_file in admin/inc/security_functions.php.

Exploit
  • EPSS 0.22%
  • Veröffentlicht 21.11.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:57:53

In GetSimpleCMS 3.3.15, admin/upload.php blocks .html uploads but there are several alternative cases in which HTML can be executed, such as a file with no extension or an unrecognized extension (e.g., the test or test.asdf filename), because of admi...