A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 28 Mar 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cmsmadesimple
Cmsmadesimple cms Made Simple |
|
| CPEs | cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.19:*:*:*:*:*:*:* cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.21:*:*:*:*:*:*:* |
|
| Vendors & Products |
Cmsmadesimple
Cmsmadesimple cms Made Simple |
Mon, 19 Aug 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-19T07:48:15.109Z
Reserved: 2024-02-26T00:00:00
Link: CVE-2024-27622
Updated: 2024-08-19T07:48:15.109Z
Status : Analyzed
Published: 2024-03-05T14:15:49.030
Modified: 2025-03-28T16:05:54.780
Link: CVE-2024-27622
No data.
OpenCVE Enrichment
No data.