← Zuruck zu CVEs
CVE-2021-47778
HIGH7.2
Beschreibung
GetSimple CMS My SMTP Contact Plugin 1.1.2 contains a PHP code injection vulnerability. An authenticated administrator can inject arbitrary PHP code through plugin configuration parameters, leading to remote code execution on the server.
CVE Details
CVSS v3.1 Bewertung7.2
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienHIGH
BenutzerinteraktionNONE
Veroffentlicht1/21/2026
Zuletzt geandert3/6/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
get-simple:getsimplecms
Schwachen (CWE)
CWE-94
Referenzen
http://get-simple.info(disclosure@vulncheck.com)
https://github.com/GetSimpleCMS/GetSimpleCMS(disclosure@vulncheck.com)
https://github.com/boku7/gsSMTP-Csrf2Xss2RCE/(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/49774(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/getsimple-cms-my-smtp-contact-plugin-php-code-injection(disclosure@vulncheck.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.