CMSimple 5.4 contains an authenticated local file inclusion vulnerability that allows remote attackers to manipulate PHP session files and execute arbitrary code. Attackers can leverage the vulnerability by changing the functions file path and uploading malicious PHP code through session file upload mechanisms.
History

Tue, 23 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 23 Dec 2025 19:45:00 +0000

Type Values Removed Values Added
Description CMSimple 5.4 contains an authenticated local file inclusion vulnerability that allows remote attackers to manipulate PHP session files and execute arbitrary code. Attackers can leverage the vulnerability by changing the functions file path and uploading malicious PHP code through session file upload mechanisms.
Title CMSimple 5.4 Authenticated Local File Inclusion Remote Code Execution
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-23T21:08:32.863Z

Reserved: 2025-12-23T13:24:04.579Z

Link: CVE-2021-47734

cve-icon Vulnrichment

Updated: 2025-12-23T21:08:30.624Z

cve-icon NVD

Status : Received

Published: 2025-12-23T20:15:45.123

Modified: 2025-12-23T20:15:45.123

Link: CVE-2021-47734

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.