A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 28 Mar 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cmsmadesimple
Cmsmadesimple cms Made Simple |
|
| CPEs | cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.19:*:*:*:*:*:*:* cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.21:*:*:*:*:*:*:* |
|
| Vendors & Products |
Cmsmadesimple
Cmsmadesimple cms Made Simple |
Mon, 19 Aug 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-19T07:48:15.109Z
Reserved: 2024-02-26T00:00:00
Link: CVE-2024-27622
Updated: 2024-08-19T07:48:15.109Z
Status : Analyzed
Published: 2024-03-05T14:15:49.030
Modified: 2025-03-28T16:05:54.780
Link: CVE-2024-27622
No data.
OpenCVE Enrichment
No data.