Description
A vulnerability, which was classified as problematic, has been found in GetSimple CMS. Affected by this issue is the file /admin/edit.php of the Content Module. The manipulation of the argument post-content with an input like <script>alert(1)</script> leads to cross site scripting. The attack may be launched remotely but requires authentication. Expoit details have been disclosed within the advisory.
References (2)
Core 2
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/joinia/project/blob/main/GetSimple/GetSimplereadme.md
Third Party Advisory x_refsource_misc
https://vuldb.com/?id.198542
Scores
CVSS v3
3.5
EPSS
0.0019
EPSS Percentile
39.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
get-simple/getsimple_cms
Published
Apr 27, 2022
Tracked Since
Feb 18, 2026