GetSimple CMS My SMTP Contact Plugin 1.1.1 contains a cross-site request forgery (CSRF) vulnerability. Attackers can craft a malicious webpage that, when visited by an authenticated administrator, can change SMTP configuration settings in the plugin. This may allow unauthorized changes but does not directly enable remote code execution.
References
| Link | Resource |
|---|---|
| http://get-simple.info | Product |
| https://github.com/GetSimpleCMS/GetSimpleCMS | Product |
| https://www.exploit-db.com/exploits/49774 | Exploit Third Party Advisory VDB Entry |
| https://www.exploit-db.com/exploits/49798 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/getsimple-cms-my-smtp-contact-plugin-csrf | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-21 18:16
Updated : 2026-03-06 20:15
NVD link : CVE-2021-47830
Mitre link : CVE-2021-47830
CVE.ORG link : CVE-2021-47830
JSON object : View
Products Affected
get-simple
- getsimplecms
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
