GetSimple CMS v3.3.16 was discovered to contain a remote code execution (RCE) vulnerability via the edited_file parameter in admin/theme-edit.php.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/172553/GetSimple-CMS-3.3.16-Shell-Upload.html | |
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1352 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
24 May 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Oct 2022, 03:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | NVD-CWE-noinfo | |
References | (MISC) https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1352 - Exploit, Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:a:get-simple:getsimple_cms:3.3.16:*:*:*:*:*:*:* |
18 Oct 2022, 16:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-18 15:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-41544
Mitre link : CVE-2022-41544
CVE.ORG link : CVE-2022-41544
JSON object : View
Products Affected
get-simple
- getsimple_cms
CWE