Description
A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code.
Published: 2024-03-05
Score: 7.2 High
EPSS: 4.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.03757}

epss

{'score': 0.02651}


Fri, 28 Mar 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Cmsmadesimple
Cmsmadesimple cms Made Simple
CPEs cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.19:*:*:*:*:*:*:*
cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.21:*:*:*:*:*:*:*
Vendors & Products Cmsmadesimple
Cmsmadesimple cms Made Simple

Mon, 19 Aug 2024 08:30:00 +0000


Subscriptions

Cmsmadesimple Cms Made Simple
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-19T07:48:15.109Z

Reserved: 2024-02-26T00:00:00.000Z

Link: CVE-2024-27622

cve-icon Vulnrichment

Updated: 2024-08-19T07:48:15.109Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-05T14:15:49.030

Modified: 2025-03-28T16:05:54.780

Link: CVE-2024-27622

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses