← Retour aux CVEs
CVE-2021-47830
MEDIUM6.5
Description
GetSimple CMS My SMTP Contact Plugin 1.1.1 contains a cross-site request forgery (CSRF) vulnerability. Attackers can craft a malicious webpage that, when visited by an authenticated administrator, can change SMTP configuration settings in the plugin. This may allow unauthorized changes but does not directly enable remote code execution.
Details CVE
Score CVSS v3.16.5
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie1/21/2026
Derniere modification3/6/2026
Sourcenvd
Observations honeypot0
Produits affectes
get-simple:getsimplecms
Faiblesses (CWE)
CWE-352
References
http://get-simple.info(disclosure@vulncheck.com)
https://github.com/GetSimpleCMS/GetSimpleCMS(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/49774(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/49798(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/getsimple-cms-my-smtp-contact-plugin-csrf(disclosure@vulncheck.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.