Vulnerability Description
A vulnerability, which was classified as problematic, has been found in GetSimple CMS. Affected by this issue is the file /admin/edit.php of the Content Module. The manipulation of the argument post-content with an input like <script>alert(1)</script> leads to cross site scripting. The attack may be launched remotely but requires authentication. Expoit details have been disclosed within the advisory.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Get-Simple | Getsimple Cms | - |
Related Weaknesses (CWE)
References
- https://github.com/joinia/project/blob/main/GetSimple/GetSimplereadme.mdExploitThird Party Advisory
- https://vuldb.com/?id.198542Third Party Advisory
- https://github.com/joinia/project/blob/main/GetSimple/GetSimplereadme.mdExploitThird Party Advisory
- https://vuldb.com/?id.198542Third Party Advisory
FAQ
What is CVE-2022-1503?
CVE-2022-1503 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability, which was classified as problematic, has been found in GetSimple CMS. Affected by this issue is the file /admin/edit.php of the Content Module. The manipulation of the argument post-c...
How severe is CVE-2022-1503?
CVE-2022-1503 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1503?
Check the references section above for vendor advisories and patch information. Affected products include: Get-Simple Getsimple Cms.