← Back to CVEs
CVE-2021-47778
HIGH7.2
Description
GetSimple CMS My SMTP Contact Plugin 1.1.2 contains a PHP code injection vulnerability. An authenticated administrator can inject arbitrary PHP code through plugin configuration parameters, leading to remote code execution on the server.
CVE Details
CVSS v3.1 Score7.2
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published1/21/2026
Last Modified3/6/2026
Sourcenvd
Honeypot Sightings0
Affected Products
get-simple:getsimplecms
Weaknesses (CWE)
CWE-94
References
http://get-simple.info(disclosure@vulncheck.com)
https://github.com/GetSimpleCMS/GetSimpleCMS(disclosure@vulncheck.com)
https://github.com/boku7/gsSMTP-Csrf2Xss2RCE/(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/49774(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/getsimple-cms-my-smtp-contact-plugin-php-code-injection(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.