Description
CMSimple 5.4 contains an authenticated remote code execution vulnerability that allows logged-in attackers to inject malicious PHP code into template files. Attackers can exploit the template editing functionality by crafting a reverse shell payload and saving it through the template editing endpoint with a valid CSRF token.
Published: 2025-12-23
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 31 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:cmsimple:cmsimple:5.4:*:*:*:*:*:*:*

Wed, 24 Dec 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Cmsimple
Cmsimple cmsimple
Vendors & Products Cmsimple
Cmsimple cmsimple

Tue, 23 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 23 Dec 2025 19:45:00 +0000

Type Values Removed Values Added
Description CMSimple 5.4 contains an authenticated remote code execution vulnerability that allows logged-in attackers to inject malicious PHP code into template files. Attackers can exploit the template editing functionality by crafting a reverse shell payload and saving it through the template editing endpoint with a valid CSRF token.
Title CMSimple 5.4 Authenticated Remote Code Execution via Template Editing
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Cmsimple Cmsimple
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-05T12:02:27.210Z

Reserved: 2025-12-23T13:24:04.579Z

Link: CVE-2021-47735

cve-icon Vulnrichment

Updated: 2025-12-23T21:20:22.956Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-23T20:15:45.277

Modified: 2025-12-31T21:43:13.570

Link: CVE-2021-47735

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-24T11:53:21Z

Weaknesses