GetSimple CMS CE 3.3.19 suffers from arbitrary code execution in the template editing function in the background management system, which can be used by an attacker to implement RCE.
References
| Link | Resource |
|---|---|
| https://getsimple-ce.ovh/ | Product |
| https://tasteful-stamp-da4.notion.site/CVE-2024-55085-15b1e0f227cb80a5aee6faeb820bf7e6 | Broken Link |
Configurations
History
17 Apr 2025, 01:57
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:getsimple-ce:getsimple_cms:3.3.19:*:*:*:community:*:*:* | |
| Summary |
|
|
| References | () https://getsimple-ce.ovh/ - Product | |
| References | () https://tasteful-stamp-da4.notion.site/CVE-2024-55085-15b1e0f227cb80a5aee6faeb820bf7e6 - Broken Link | |
| First Time |
Getsimple-ce getsimple Cms
Getsimple-ce |
17 Dec 2024, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-94 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
16 Dec 2024, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-12-16 23:15
Updated : 2025-04-17 01:57
NVD link : CVE-2024-55085
Mitre link : CVE-2024-55085
CVE.ORG link : CVE-2024-55085
JSON object : View
Products Affected
getsimple-ce
- getsimple_cms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
