← Zuruck zu CVEs
CVE-2021-47830
MEDIUM6.5
Beschreibung
GetSimple CMS My SMTP Contact Plugin 1.1.1 contains a cross-site request forgery (CSRF) vulnerability. Attackers can craft a malicious webpage that, when visited by an authenticated administrator, can change SMTP configuration settings in the plugin. This may allow unauthorized changes but does not directly enable remote code execution.
CVE Details
CVSS v3.1 Bewertung6.5
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht1/21/2026
Zuletzt geandert3/6/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
get-simple:getsimplecms
Schwachen (CWE)
CWE-352
Referenzen
http://get-simple.info(disclosure@vulncheck.com)
https://github.com/GetSimpleCMS/GetSimpleCMS(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/49774(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/49798(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/getsimple-cms-my-smtp-contact-plugin-csrf(disclosure@vulncheck.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.