CVE-2024-55085

GetSimple CMS CE 3.3.19 suffers from arbitrary code execution in the template editing function in the background management system, which can be used by an attacker to implement RCE.
Configurations

Configuration 1 (hide)

cpe:2.3:a:getsimple-ce:getsimple_cms:3.3.19:*:*:*:community:*:*:*

History

17 Apr 2025, 01:57

Type Values Removed Values Added
References () https://getsimple-ce.ovh/ - () https://getsimple-ce.ovh/ - Product
References () https://tasteful-stamp-da4.notion.site/CVE-2024-55085-15b1e0f227cb80a5aee6faeb820bf7e6 - () https://tasteful-stamp-da4.notion.site/CVE-2024-55085-15b1e0f227cb80a5aee6faeb820bf7e6 - Broken Link
Summary
  • (es) GetSimple CMS CE 3.3.19 sufre ejecución de código arbitrario en la función de edición de plantillas en el sistema de administración en segundo plano, que puede ser utilizado por un atacante para implementar RCE.
CPE cpe:2.3:a:getsimple-ce:getsimple_cms:3.3.19:*:*:*:community:*:*:*
First Time Getsimple-ce getsimple Cms
Getsimple-ce

17 Dec 2024, 15:15

Type Values Removed Values Added
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

16 Dec 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-16 23:15

Updated : 2025-04-17 01:57


NVD link : CVE-2024-55085

Mitre link : CVE-2024-55085

CVE.ORG link : CVE-2024-55085


JSON object : View

Products Affected

getsimple-ce

  • getsimple_cms
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')