THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-27622

Assignermitre
Reserved2024-02-26
Published2024-03-05
Updated2024-06-21

Description

A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code.

References

https://github.com/capture0x/CMSMadeSimple/

https://packetstormsecurity.com/files/177241/CMS-Made-Simple-2.2.19-Remote-Code-Execution.html

cve.org CVE-2024-27622

nvd.nist.gov CVE-2024-27622

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-27622
© Copyright 2024 THREATINT. Made in Cyprus with +