CMSimple 5.4 contains an authenticated remote code execution vulnerability that allows logged-in attackers to inject malicious PHP code into template files. Attackers can exploit the template editing functionality by crafting a reverse shell payload and saving it through the template editing endpoint with a valid CSRF token.
Metrics
Affected Vendors & Products
References
History
Tue, 23 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CMSimple 5.4 contains an authenticated remote code execution vulnerability that allows logged-in attackers to inject malicious PHP code into template files. Attackers can exploit the template editing functionality by crafting a reverse shell payload and saving it through the template editing endpoint with a valid CSRF token. | |
| Title | CMSimple 5.4 Authenticated Remote Code Execution via Template Editing | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-23T21:20:25.731Z
Reserved: 2025-12-23T13:24:04.579Z
Link: CVE-2021-47735
No data.
Status : Received
Published: 2025-12-23T20:15:45.277
Modified: 2025-12-23T20:15:45.277
Link: CVE-2021-47735
No data.
OpenCVE Enrichment
No data.