Lucene search

K
CmsmadesimpleCms Made Simple

24 matches found

CVE
CVE
added 2022/02/28 11:15 p.m.109 views

CVE-2022-23906

CMS Made Simple v2.2.15 was discovered to contain a Remote Command Execution (RCE) vulnerability via the upload avatar function. This vulnerability is exploited via a crafted image file.

7.2CVSS7.1AI score0.06427EPSS
CVE
CVE
added 2020/03/20 4:15 a.m.82 views

CVE-2020-10682

The Filemanager in CMS Made Simple 2.2.13 allows remote code execution via a .php.jpegd JPEG file, as demonstrated by m1_files[] to admin/moduleinterface.php. The file should be sent as application/octet-stream and contain PHP code (it need not be a valid JPEG file).

7.8CVSS7.9AI score0.01856EPSS
CVE
CVE
added 2019/11/26 11:15 p.m.61 views

CVE-2011-4310

The news module in CMSMS before 1.9.4.3 allows remote attackers to corrupt new articles.

7.5CVSS7.5AI score0.00233EPSS
CVE
CVE
added 2018/04/27 6:29 p.m.61 views

CVE-2018-10517

In CMS Made Simple (CMSMS) through 2.2.7, the "module import" operation in the admin dashboard contains a remote code execution vulnerability, exploitable by an admin user, because an XML Package can contain base64-encoded PHP code in a data element.

7.2CVSS7.5AI score0.18534EPSS
CVE
CVE
added 2018/03/13 1:29 a.m.60 views

CVE-2018-1000094

CMS Made Simple version 2.2.5 contains a Remote Code Execution vulnerability in File Manager that can result in Allows an authenticated admin that has access to the file manager to execute code on the server. This attack appear to be exploitable via File upload -> copy to any extension.

7.2CVSS7.2AI score0.55987EPSS
CVE
CVE
added 2008/01/04 11:46 a.m.59 views

CVE-2007-6656

SQL injection vulnerability in content_css.php in the TinyMCE module for CMS Made Simple 1.2.2 and earlier allows remote attackers to execute arbitrary SQL commands via the templateid parameter.

7.5CVSS8.4AI score0.00874EPSS
CVE
CVE
added 2024/03/12 4:15 p.m.59 views

CVE-2024-1529

Vulnerability in CMS Made Simple 2.2.14, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /admin/adduser.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted JavaScript payl...

7.4CVSS6.6AI score0.00059EPSS
CVE
CVE
added 2024/03/12 4:15 p.m.58 views

CVE-2024-1528

CMS Made Simple version 2.2.14, does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /admin/moduleinterface.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted JavaScript payload to ...

7.4CVSS6.6AI score0.00059EPSS
CVE
CVE
added 2024/03/05 2:15 p.m.58 views

CVE-2024-27622

A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrati...

7.2CVSS9.7AI score0.03072EPSS
CVE
CVE
added 2017/05/12 7:29 a.m.54 views

CVE-2017-8912

CMS Made Simple (CMSMS) 2.1.6 allows remote authenticated administrators to execute arbitrary PHP code via the code parameter to admin/editusertag.php, related to the CreateTagFunction and CallUserTag functions. NOTE: the vendor reportedly has stated this is "a feature, not a bug.

7.2CVSS7.1AI score0.03714EPSS
CVE
CVE
added 2018/01/02 5:29 p.m.50 views

CVE-2017-1000454

CMS Made Simple 2.1.6, 2.2, 2.2.1 are vulnerable to Smarty Template Injection in some core components, resulting in local file read before 2.2, and local file inclusion since 2.2.1

7.8CVSS7.5AI score0.00176EPSS
CVE
CVE
added 2021/09/17 4:15 p.m.49 views

CVE-2019-9060

An issue was discovered in CMS Made Simple 2.2.8. It is possible to achieve unauthenticated path traversal in the CGExtensions module (in the file action.setdefaulttemplate.php) with the m1_filename parameter; and through the action.showmessage.php file, it is possible to read arbitrary file conten...

7.5CVSS7.7AI score0.00415EPSS
CVE
CVE
added 2023/10/26 10:15 p.m.46 views

CVE-2023-43352

An issue in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted payload to the Content Manager Menu component.

7.8CVSS7.7AI score0.00664EPSS
CVE
CVE
added 2005/09/08 10:3 a.m.45 views

CVE-2005-2846

PHP remote file inclusion vulnerability in lang.php in CMS Made Simple 0.10 and earlier allows remote attackers to execute arbitrary PHP code via the nls[file][vx][vxsfx] parameter.

7.5CVSS7.7AI score0.02434EPSS
CVE
CVE
added 2007/01/29 5:28 p.m.45 views

CVE-2007-0551

Multiple PHP remote file inclusion vulnerabilities in cmsimple/cms.php in CMSimple 2.7 allow remote attackers to execute arbitrary PHP code via a URL in the (1) pth[file][config] and (2) pth[file][image] parameters.

7.5CVSS7.7AI score0.00585EPSS
CVE
CVE
added 2010/10/08 9:0 p.m.45 views

CVE-2010-2797

Directory traversal vulnerability in lib/translation.functions.php in CMS Made Simple before 1.8.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the default_cms_lang parameter to an admin script, as demonstrated by admin/addbookmark.php, a different vuln...

7.5CVSS7.1AI score0.06404EPSS
CVE
CVE
added 2018/04/27 6:29 p.m.44 views

CVE-2018-10515

In CMS Made Simple (CMSMS) through 2.2.7, the "file unpack" operation in the admin dashboard contains a remote code execution vulnerability exploitable by an admin user because a .php file can be present in the extracted ZIP archive.

7.2CVSS7.4AI score0.02743EPSS
CVE
CVE
added 2018/04/13 5:29 a.m.38 views

CVE-2018-10083

CMS Made Simple (CMSMS) through 2.2.7 contains an arbitrary file deletion vulnerability in the admin dashboard via directory traversal sequences in the val parameter within a cmd=del request, because code under modules\FilePicker does not restrict the val parameter.

7.5CVSS7.6AI score0.0089EPSS
CVE
CVE
added 2019/03/26 5:29 p.m.36 views

CVE-2019-9059

An issue was discovered in CMS Made Simple 2.2.8. It is possible, with an administrator account, to achieve command injection by modifying the path of the e-mail executable in Mail Settings, setting "sendmail" in the "Mailer" option, and launching the "Forgot your password" feature.

7.2CVSS7.6AI score0.04139EPSS
CVE
CVE
added 2007/05/02 11:19 p.m.35 views

CVE-2007-2473

SQL injection vulnerability in stylesheet.php in CMS Made Simple 1.0.5 and earlier allows remote attackers to execute arbitrary SQL commands via the templateid parameter.

7.5CVSS8.4AI score0.00911EPSS
CVE
CVE
added 2018/04/13 5:29 a.m.35 views

CVE-2018-10086

CMS Made Simple (CMSMS) through 2.2.7 contains an arbitrary code execution vulnerability in the admin dashboard because the implementation uses "eval('function testfunction'.rand()" and it is possible to bypass certain restrictions on these "testfunction" functions.

7.2CVSS7.3AI score0.01019EPSS
CVE
CVE
added 2019/03/26 5:29 p.m.34 views

CVE-2019-9058

An issue was discovered in CMS Made Simple 2.2.8. In the administrator page admin/changegroupperm.php, it is possible to send a crafted value in the sel_groups parameter that leads to authenticated object injection.

7.2CVSS7.3AI score0.01005EPSS
CVE
CVE
added 2020/08/14 3:15 p.m.30 views

CVE-2020-17462

CMS Made Simple 2.2.14 allows Authenticated Arbitrary File Upload because the File Manager does not block .ptar files, a related issue to CVE-2017-16798.

7.8CVSS5.4AI score0.00437EPSS
CVE
CVE
added 2023/05/08 2:15 p.m.28 views

CVE-2021-28998

File upload vulnerability in CMS Made Simple through 2.2.15 allows remote authenticated attackers to gain a webshell via a crafted phar file.

7.2CVSS6.7AI score0.00307EPSS