Impact
GetSimple CMS hosts a flaw in the Uploaded Files feature that allows an attacker to read arbitrary files from the server. The vulnerability stems from insufficient validation of file paths, enabling directory traversal and direct file access. As a result, an attacker could gain confidential information, such as configuration files or source code, or potentially influence the site’s behavior by reading sensitive data.
Affected Systems
All releases of GetSimple CMS, including the community edition at version 3.3.22, are vulnerable. The issue exists in the core uploads handling component, regardless of the specific document or image uploaded.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity. The EPSS score is below 1 %, suggesting a currently low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation would typically occur via an authenticated or unauthenticated upload mechanism, where the attacker supplies a crafted filename to read arbitrary files. Successful exploitation requires the web application to resolve the supplied path to a real file on disk without proper sanitization.
OpenCVE Enrichment