Описание
A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code.
Ссылки
- ExploitThird Party Advisory
- ExploitVDB Entry
- ExploitThird Party Advisory
- ExploitVDB Entry
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.19:*:*:*:*:*:*:*
cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.21:*:*:*:*:*:*:*
EPSS
Процентиль: 86%
0.03072
Низкий
7.2 High
CVSS3
Дефекты
CWE-75
Связанные уязвимости
CVSS3: 7.2
github
почти 2 года назад
A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code.
EPSS
Процентиль: 86%
0.03072
Низкий
7.2 High
CVSS3
Дефекты
CWE-75