Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xcf5-jfw6-6364

Опубликовано: 21 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 0

Описание

GetSimple CMS My SMTP Contact Plugin 1.1.2 suffers from a Stored Cross-Site Scripting (XSS) vulnerability. The plugin attempts to sanitize user input using htmlspecialchars(), but this can be bypassed by passing dangerous characters as escaped hex bytes. This allows attackers to inject arbitrary client-side code that executes in the administrator's browser when visiting a malicious page.

GetSimple CMS My SMTP Contact Plugin 1.1.2 suffers from a Stored Cross-Site Scripting (XSS) vulnerability. The plugin attempts to sanitize user input using htmlspecialchars(), but this can be bypassed by passing dangerous characters as escaped hex bytes. This allows attackers to inject arbitrary client-side code that executes in the administrator's browser when visiting a malicious page.

EPSS

Процентиль: 18%
0.00056
Низкий

0 Low

CVSS4

Дефекты

CWE-79

Связанные уязвимости

nvd
18 дней назад

GetSimple CMS My SMTP Contact Plugin 1.1.2 suffers from a Stored Cross-Site Scripting (XSS) vulnerability. The plugin attempts to sanitize user input using htmlspecialchars(), but this can be bypassed by passing dangerous characters as escaped hex bytes. This allows attackers to inject arbitrary client-side code that executes in the administrator's browser when visiting a malicious page.

EPSS

Процентиль: 18%
0.00056
Низкий

0 Low

CVSS4

Дефекты

CWE-79