GetSimple CMS My SMTP Contact Plugin 1.1.2 contains a PHP code injection vulnerability. An authenticated administrator can inject arbitrary PHP code through plugin configuration parameters, leading to remote code execution on the server.
References
| Link | Resource |
|---|---|
| http://get-simple.info | Product |
| https://github.com/GetSimpleCMS/GetSimpleCMS | Product |
| https://github.com/boku7/gsSMTP-Csrf2Xss2RCE/ | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/49774 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/getsimple-cms-my-smtp-contact-plugin-php-code-injection | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-21 18:16
Updated : 2026-03-06 20:15
NVD link : CVE-2021-47778
Mitre link : CVE-2021-47778
CVE.ORG link : CVE-2021-47778
JSON object : View
Products Affected
get-simple
- getsimplecms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
