First published: Tue Mar 05 2024(Updated: )
A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CMS Made Simple | >=2.2.19<=2.2.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27622 is considered a high severity vulnerability due to its remote code execution capability.
To fix CVE-2024-27622, it is recommended to upgrade CMS Made Simple to the latest version that addresses this vulnerability.
CVE-2024-27622 affects users of CMS Made Simple versions 2.2.19 and 2.2.21.
CVE-2024-27622 is a remote code execution vulnerability resulting from inadequate input sanitization.
No, CVE-2024-27622 can only be exploited by authenticated users with administrative privileges.