CVE-2022-1503

LOW

Get-simple Getsimple Cms - XSS

Title source: rule
STIX 2.1

Description

A vulnerability, which was classified as problematic, has been found in GetSimple CMS. Affected by this issue is the file /admin/edit.php of the Content Module. The manipulation of the argument post-content with an input like <script>alert(1)</script> leads to cross site scripting. The attack may be launched remotely but requires authentication. Expoit details have been disclosed within the advisory.

References (2)

Core 2
Core References
Third Party Advisory x_refsource_misc
https://vuldb.com/?id.198542

Scores

CVSS v3 3.5
EPSS 0.0019
EPSS Percentile 39.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-79
Status published
Products (1)
get-simple/getsimple_cms
Published Apr 27, 2022
Tracked Since Feb 18, 2026