Vulnerability Description
GetSimple CMS is a content management system. In versions starting from 3.3.16 to 3.3.21, an authenticated user with access to the Edit component can inject arbitrary PHP into a component file and execute it via a crafted query string, resulting in Remote Code Execution (RCE). This issue is set to be patched in version 3.3.22.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Getsimple-Ce | Getsimple Cms | >= 3.3.16, < 3.3.22 |
Related Weaknesses (CWE)
References
- https://github.com/GetSimpleCMS-CE/GetSimpleCMS-CE/security/advisories/GHSA-g435ExploitVendor Advisory
- https://github.com/GetSimpleCMS-CE/GetSimpleCMS-CE/security/advisories/GHSA-g435ExploitVendor Advisory
FAQ
What is CVE-2025-48492?
CVE-2025-48492 is a vulnerability with a CVSS score of 8.8 (HIGH). GetSimple CMS is a content management system. In versions starting from 3.3.16 to 3.3.21, an authenticated user with access to the Edit component can inject arbitrary PHP into a component file and exe...
How severe is CVE-2025-48492?
CVE-2025-48492 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-48492?
Check the references section above for vendor advisories and patch information. Affected products include: Getsimple-Ce Getsimple Cms.