CVE-2022-1503

A vulnerability, which was classified as problematic, has been found in GetSimple CMS. Affected by this issue is the file /admin/edit.php of the Content Module. The manipulation of the argument post-content with an input like alert(1) leads to cross site scripting. The attack may be launched remotely but requires authentication. Expoit details have been disclosed within the advisory.
References
Link Resource
https://vuldb.com/?id.198542 Third Party Advisory
https://github.com/joinia/project/blob/main/GetSimple/GetSimplereadme.md Exploit Third Party Advisory
Configurations

Configuration 1

cpe:2.3:a:get-simple:getsimple_cms:-:*:*:*:*:*:*:*

Information

Published : 2022-04-27 08:15

Updated : 2022-05-05 08:16


NVD link : CVE-2022-1503

Mitre link : CVE-2022-1503

Products Affected
No products.
CWE