Cmsimple : Security Vulnerabilities, CVEs,
Cross Site Scripting vulnerability in CmSimple v.5.15 allows a remote attacker to execute arbitrary code via the functions.php component.
Max CVSS
N/A
EPSS Score
N/A
Published
2024-04-19
Updated
2024-04-19
A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Configuration parameter under the Language section.
Max CVSS
N/A
EPSS Score
0.04%
Published
2024-04-17
Updated
2024-04-18
A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Edit parameter under the Language section.
Max CVSS
N/A
EPSS Score
0.04%
Published
2024-04-17
Updated
2024-04-18
CMSimple 5.4 is vulnerable to Cross Site Scripting (XSS) via the file upload feature.
Max CVSS
5.4
EPSS Score
0.06%
Published
2022-04-13
Updated
2022-08-06
CMSimple 5.4 is vulnerable to Directory Traversal. The vulnerability exists when a user changes the file name to malicious file on config.php leading to remote code execution.
Max CVSS
9.8
EPSS Score
0.48%
Published
2022-04-13
Updated
2022-04-20
CMSimple 4.7.5 has XSS via an admin's upload of an SVG file at a ?userfiles&subdir=userfiles/images/flags/ URI.
Max CVSS
4.8
EPSS Score
0.06%
Published
2018-12-19
Updated
2019-02-26
CMSimple 4.7.5 has XSS via an admin's use of a ?file=config&action=array URI.
Max CVSS
4.8
EPSS Score
0.06%
Published
2018-12-19
Updated
2019-02-25
Cross-site scripting (XSS) vulnerability in whizzywig/wb.php in CMSimple Classic 3.54 and earlier, possibly as downloaded before February 26, 2014, allows remote attackers to inject arbitrary web script or HTML via the d parameter.
Max CVSS
4.3
EPSS Score
0.18%
Published
2014-03-20
Updated
2018-10-09
Directory traversal vulnerability in cmsimple/cms.php in CMSimple 3.1, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.
Max CVSS
6.8
EPSS Score
6.34%
Published
2008-06-10
Updated
2017-09-29
9 vulnerabilities found