First published: Tue Mar 12 2024(Updated: )
Unrestricted file upload vulnerability in CMS Made Simple, affecting version 2.2.14. This vulnerability allows an authenticated user to bypass the security measures of the upload functionality and potentially create a remote execution of commands via webshell.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
CMS Made Simple | ||
Simple CMS | =2.2.14 |
There is no reported solution at this time.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1527 is classified as a high severity vulnerability due to its potential to allow remote command execution.
To fix CVE-2024-1527, upgrade CMS Made Simple to version 2.2.15 or later.
CVE-2024-1527 affects CMS Made Simple version 2.2.14 and earlier versions.
CVE-2024-1527 allows attackers to upload malicious files, potentially leading to remote command execution through webshells.
Yes, an authenticated user can exploit CVE-2024-1527 to bypass security measures.