GetSimple CMS is a content management system. In versions starting from 3.3.16 to 3.3.21, an authenticated user with access to the Edit component can inject arbitrary PHP into a component file and execute it via a crafted query string, resulting in Remote Code Execution (RCE). This issue is set to be patched in version 3.3.22.
References
Link | Resource |
---|---|
https://github.com/GetSimpleCMS-CE/GetSimpleCMS-CE/security/advisories/GHSA-g435-p72m-p582 | Exploit Vendor Advisory |
https://github.com/GetSimpleCMS-CE/GetSimpleCMS-CE/security/advisories/GHSA-g435-p72m-p582 | Exploit Vendor Advisory |
Configurations
History
04 Jun 2025, 19:56
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-30 07:15
Updated : 2025-06-04 19:56
NVD link : CVE-2025-48492
Mitre link : CVE-2025-48492
CVE.ORG link : CVE-2025-48492
JSON object : View
Products Affected
getsimple-ce
- getsimple_cms
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')