GetSimple CMS v3.3.16 was discovered to contain a remote code execution (RCE) vulnerability via the edited_file parameter in admin/theme-edit.php.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/172553/GetSimple-CMS-3.3.16-Shell-Upload.html | |
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1352 | Exploit Issue Tracking Third Party Advisory |
http://packetstormsecurity.com/files/172553/GetSimple-CMS-3.3.16-Shell-Upload.html | |
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1352 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 07:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/172553/GetSimple-CMS-3.3.16-Shell-Upload.html - | |
References | () https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1352 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2022-10-18 15:15
Updated : 2024-11-21 07:23
NVD link : CVE-2022-41544
Mitre link : CVE-2022-41544
CVE.ORG link : CVE-2022-41544
JSON object : View
Products Affected
get-simple
- getsimple_cms
CWE