First published: Mon Dec 16 2024(Updated: )
GetSimple CMS CE 3.3.19 suffers from arbitrary code execution in the template editing function in the background management system, which can be used by an attacker to implement RCE.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Getsimple CMS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-55085 is classified as high due to its potential for arbitrary code execution.
To fix CVE-2024-55085, update GetSimple CMS to the latest version where the vulnerability has been addressed.
CVE-2024-55085 allows an attacker to execute arbitrary code through the template editing function, compromising the security of the CMS.
Any user or organization utilizing GetSimple CMS CE version 3.3.19 is affected by CVE-2024-55085.
Yes, CVE-2024-55085 is known to be vulnerable to exploitation by attackers via the template editing feature.