Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 22 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GetSimple CMS My SMTP Contact Plugin 1.1.1 contains a cross-site request forgery (CSRF) vulnerability. Attackers can craft a malicious webpage that, when visited by an authenticated administrator, can change SMTP configuration settings in the plugin. This may allow unauthorized changes but does not directly enable remote code execution. | |
| Title | GetSimple CMS My SMTP Contact Plugin 1.1.1 - CSRF | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-22T15:54:36.412Z
Reserved: 2026-01-14T17:11:19.900Z
Link: CVE-2021-47830
Updated: 2026-01-22T15:54:32.554Z
Status : Received
Published: 2026-01-21T18:16:09.833
Modified: 2026-01-21T18:16:09.833
Link: CVE-2021-47830
No data.
OpenCVE Enrichment
No data.