Vulnerability Description
Cross Site Scripting (XSS) vulnerability in GetSimpleCMS <= 3.3.15 in admin/changedata.php via the redirect_url parameter and the headers_sent function.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Get-Simple | Getsimplecms | <= 3.3.15 |
Related Weaknesses (CWE)
References
- https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1310ExploitThird Party Advisory
- https://github.com/LoRexxar/CVE_Request/blob/master/getsimplecms%20v3.3.15/getsiRelease NotesThird Party Advisory
- https://www.seebug.org/vuldb/ssvid-97929Third Party Advisory
- https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1310ExploitThird Party Advisory
- https://github.com/LoRexxar/CVE_Request/blob/master/getsimplecms%20v3.3.15/getsiRelease NotesThird Party Advisory
- https://www.seebug.org/vuldb/ssvid-97929Third Party Advisory
FAQ
What is CVE-2020-18657?
CVE-2020-18657 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Cross Site Scripting (XSS) vulnerability in GetSimpleCMS <= 3.3.15 in admin/changedata.php via the redirect_url parameter and the headers_sent function.
How severe is CVE-2020-18657?
CVE-2020-18657 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-18657?
Check the references section above for vendor advisories and patch information. Affected products include: Get-Simple Getsimplecms.