A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.03757}

epss

{'score': 0.02651}


Fri, 28 Mar 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Cmsmadesimple
Cmsmadesimple cms Made Simple
CPEs cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.19:*:*:*:*:*:*:*
cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.21:*:*:*:*:*:*:*
Vendors & Products Cmsmadesimple
Cmsmadesimple cms Made Simple

Mon, 19 Aug 2024 08:30:00 +0000


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-19T07:48:15.109Z

Reserved: 2024-02-26T00:00:00

Link: CVE-2024-27622

cve-icon Vulnrichment

Updated: 2024-08-19T07:48:15.109Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-05T14:15:49.030

Modified: 2025-03-28T16:05:54.780

Link: CVE-2024-27622

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.