Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 06 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:get-simple:getsimplecms:1.1.2:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Get-simple
Get-simple getsimplecms |
|
| Vendors & Products |
Get-simple
Get-simple getsimplecms |
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GetSimple CMS My SMTP Contact Plugin 1.1.2 contains a PHP code injection vulnerability. An authenticated administrator can inject arbitrary PHP code through plugin configuration parameters, leading to remote code execution on the server. | |
| Title | GetSimple CMS My SMTP Contact Plugin 1.1.2 - PHP Code Injection | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:06:07.691Z
Reserved: 2026-01-14T14:39:44.737Z
Link: CVE-2021-47778
Updated: 2026-01-22T16:46:47.759Z
Status : Analyzed
Published: 2026-01-21T18:16:09.250
Modified: 2026-03-06T20:15:55.737
Link: CVE-2021-47778
No data.
OpenCVE Enrichment
Updated: 2026-01-22T10:08:57Z