CVE-2024-55085

GetSimple CMS CE 3.3.19 suffers from arbitrary code execution in the template editing function in the background management system, which can be used by an attacker to implement RCE.
Configurations

Configuration 1 (hide)

cpe:2.3:a:getsimple-ce:getsimple_cms:3.3.19:*:*:*:community:*:*:*

History

17 Apr 2025, 01:57

Type Values Removed Values Added
First Time Getsimple-ce getsimple Cms
Getsimple-ce
References () https://getsimple-ce.ovh/ - () https://getsimple-ce.ovh/ - Product
References () https://tasteful-stamp-da4.notion.site/CVE-2024-55085-15b1e0f227cb80a5aee6faeb820bf7e6 - () https://tasteful-stamp-da4.notion.site/CVE-2024-55085-15b1e0f227cb80a5aee6faeb820bf7e6 - Broken Link
CPE cpe:2.3:a:getsimple-ce:getsimple_cms:3.3.19:*:*:*:community:*:*:*
Summary
  • (es) GetSimple CMS CE 3.3.19 sufre ejecución de código arbitrario en la función de edición de plantillas en el sistema de administración en segundo plano, que puede ser utilizado por un atacante para implementar RCE.

17 Dec 2024, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-94

16 Dec 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-16 23:15

Updated : 2025-04-17 01:57


NVD link : CVE-2024-55085

Mitre link : CVE-2024-55085

CVE.ORG link : CVE-2024-55085


JSON object : View

Products Affected

getsimple-ce

  • getsimple_cms
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')