First published: Tue Oct 18 2022(Updated: )
GetSimple CMS v3.3.16 was discovered to contain a remote code execution (RCE) vulnerability via the edited_file parameter in admin/theme-edit.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Get-simple Getsimple Cms | =3.3.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-41544.
The severity level of CVE-2022-41544 is critical.
CVE-2022-41544 affects GetSimple CMS version 3.3.16.
CVE-2022-41544 exploits the edited_file parameter in admin/theme-edit.php to execute remote code.
At the moment, there are no known fixes for CVE-2022-41544. It is recommended to update to a non-vulnerable version or apply any available patches provided by the vendor.