CMSimple 5.4 contains a cross-site scripting vulnerability that allows attackers to bypass input filtering by using HTML to Unicode encoding. Attackers can inject malicious scripts by encoding payloads like ')-alert(1)// and execute arbitrary JavaScript when victims interact with delete buttons.
History

Tue, 23 Dec 2025 19:45:00 +0000

Type Values Removed Values Added
Description CMSimple 5.4 contains a cross-site scripting vulnerability that allows attackers to bypass input filtering by using HTML to Unicode encoding. Attackers can inject malicious scripts by encoding payloads like ')-alert(1)// and execute arbitrary JavaScript when victims interact with delete buttons.
Title CMSimple 5.4 Cross-Site Scripting via HTML Unicode Encoding
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-23T19:35:44.454Z

Reserved: 2025-12-23T13:24:04.579Z

Link: CVE-2021-47733

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-23T20:15:44.973

Modified: 2025-12-23T20:15:44.973

Link: CVE-2021-47733

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.