Vulnerability Description
CMSimple 5.4 contains an authenticated remote code execution vulnerability that allows logged-in attackers to inject malicious PHP code into template files. Attackers can exploit the template editing functionality by crafting a reverse shell payload and saving it through the template editing endpoint with a valid CSRF token.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cmsimple | Cmsimple | 5.4 |
Related Weaknesses (CWE)
References
- https://www.cmsimple.org/Product
- https://www.exploit-db.com/exploits/50356Exploit
- https://www.vulncheck.com/advisories/cmsimple-authenticated-remote-code-executioThird Party Advisory
FAQ
What is CVE-2021-47735?
CVE-2021-47735 is a vulnerability with a CVSS score of 8.8 (HIGH). CMSimple 5.4 contains an authenticated remote code execution vulnerability that allows logged-in attackers to inject malicious PHP code into template files. Attackers can exploit the template editing ...
How severe is CVE-2021-47735?
CVE-2021-47735 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-47735?
Check the references section above for vendor advisories and patch information. Affected products include: Cmsimple Cmsimple.