CMSimple 5.4 contains a cross-site scripting vulnerability that allows attackers to bypass input filtering by using HTML to Unicode encoding. Attackers can inject malicious scripts by encoding payloads like ')-alert(1)// and execute arbitrary JavaScript when victims interact with delete buttons.
Metrics
Affected Vendors & Products
References
History
Tue, 23 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CMSimple 5.4 contains a cross-site scripting vulnerability that allows attackers to bypass input filtering by using HTML to Unicode encoding. Attackers can inject malicious scripts by encoding payloads like ')-alert(1)// and execute arbitrary JavaScript when victims interact with delete buttons. | |
| Title | CMSimple 5.4 Cross-Site Scripting via HTML Unicode Encoding | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-23T19:35:44.454Z
Reserved: 2025-12-23T13:24:04.579Z
Link: CVE-2021-47733
No data.
Status : Received
Published: 2025-12-23T20:15:44.973
Modified: 2025-12-23T20:15:44.973
Link: CVE-2021-47733
No data.
OpenCVE Enrichment
No data.