Vulnerability Description
In the GetSimple CMS CE 3.3.19 management page, Server-Side Request Forgery (SSRF) can be achieved in the plug-in download address in the backend management system.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Getsimple-Ce | Getsimple Cms | 3.3.19 |
Related Weaknesses (CWE)
References
- https://getsimple-ce.ovh/Product
- https://tasteful-stamp-da4.notion.site/CVE-2024-55086-15b1e0f227cb80e4bf4ed76aacBroken Link
- https://tasteful-stamp-da4.notion.site/CVE-2024-55086-15b1e0f227cb80e4bf4ed76aacBroken Link
FAQ
What is CVE-2024-55086?
CVE-2024-55086 is a vulnerability with a CVSS score of 7.2 (HIGH). In the GetSimple CMS CE 3.3.19 management page, Server-Side Request Forgery (SSRF) can be achieved in the plug-in download address in the backend management system.
How severe is CVE-2024-55086?
CVE-2024-55086 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-55086?
Check the references section above for vendor advisories and patch information. Affected products include: Getsimple-Ce Getsimple Cms.