Vulnerability Description
CMSimple 5.4 is vulnerable to Directory Traversal. The vulnerability exists when a user changes the file name to malicious file on config.php leading to remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cmsimple | Cmsimple | 5.4 |
Related Weaknesses (CWE)
References
- https://github.com/iiSiLvEr/CMSimple5.4-VulnerabilitiesBroken Link
- https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-43741ExploitThird Party Advisory
- https://github.com/iiSiLvEr/CMSimple5.4-VulnerabilitiesBroken Link
- https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-43741ExploitThird Party Advisory
FAQ
What is CVE-2021-43741?
CVE-2021-43741 is a vulnerability with a CVSS score of 9.8 (CRITICAL). CMSimple 5.4 is vulnerable to Directory Traversal. The vulnerability exists when a user changes the file name to malicious file on config.php leading to remote code execution.
How severe is CVE-2021-43741?
CVE-2021-43741 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-43741?
Check the references section above for vendor advisories and patch information. Affected products include: Cmsimple Cmsimple.