GetSimple CMS My SMTP Contact Plugin 1.1.2 suffers from a Stored Cross-Site Scripting (XSS) vulnerability. The plugin attempts to sanitize user input using htmlspecialchars(), but this can be bypassed by passing dangerous characters as escaped hex bytes. This allows attackers to inject arbitrary client-side code that executes in the administrator's browser when visiting a malicious page.
History

Fri, 06 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:get-simple:getsimplecms:1.1.2:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Thu, 05 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Getsimple-ce
Getsimple-ce getsimple Cms
CPEs cpe:2.3:a:getsimple-ce:getsimple_cms:1.1.2:*:*:*:*:*:*:*
Vendors & Products Getsimple-ce
Getsimple-ce getsimple Cms

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Get-simple
Get-simple getsimplecms
Vendors & Products Get-simple
Get-simple getsimplecms

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 17:45:00 +0000

Type Values Removed Values Added
Description GetSimple CMS My SMTP Contact Plugin 1.1.2 suffers from a Stored Cross-Site Scripting (XSS) vulnerability. The plugin attempts to sanitize user input using htmlspecialchars(), but this can be bypassed by passing dangerous characters as escaped hex bytes. This allows attackers to inject arbitrary client-side code that executes in the administrator's browser when visiting a malicious page.
Title GetSimple CMS My SMTP Contact Plugin 1.1.2 - Stored XSS
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-05T01:29:01.212Z

Reserved: 2026-01-18T12:35:05.171Z

Link: CVE-2021-47870

cve-icon Vulnrichment

Updated: 2026-01-22T16:45:30.532Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-21T18:16:19.423

Modified: 2026-03-06T20:10:06.650

Link: CVE-2021-47870

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-22T10:08:57Z