First published: Wed Dec 18 2024(Updated: )
GetSimple CMS CE 3.3.19 is vulnerable to Server-Side Request Forgery (SSRF) in the backend plugin module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Getsimple CMS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-55088 is considered a high severity vulnerability due to the potential for unauthorized server-side requests.
To fix CVE-2024-55088, ensure you update GetSimple CMS to the latest version that patches the SSRF vulnerability.
CVE-2024-55088 can be exploited through Server-Side Request Forgery attacks, allowing attackers to send unauthorized requests from the server.
Using GetSimple CMS version 3.3.19 with CVE-2024-55088 puts your data at risk as it may allow external access to internal services.
Users of GetSimple CMS version 3.3.19 are affected by CVE-2024-55088 due to a vulnerability in the backend plugin module.