First published: Fri Nov 17 2023(Updated: )
A vulnerability was found in GetSimpleCMS 3.3.16/3.4.0a. It has been rated as critical. This issue affects some unknown processing of the file /admin/theme-edit.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-245735.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
=3.3.16 | ||
=3.4.0a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-6188 is critical with a severity value of 9.8.
The affected software of CVE-2023-6188 is GetSimpleCMS 3.3.16 and 3.4.0a.
CVE-2023-6188 is a code injection vulnerability in GetSimpleCMS 3.3.16/3.4.0a through the /admin/theme-edit.php file that can be exploited remotely.
To fix CVE-2023-6188, it is recommended to update GetSimpleCMS to the latest version or apply the available patches.
Yes, you can find references for CVE-2023-6188 at the following links: [Link 1](https://vuldb.com/?id.245735), [Link 2](https://vuldb.com/?ctiid.245735), [Link 3](https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358)