Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:cmsimple:cmsimple:5.19:*:*:*:*:*:*:* |
Wed, 31 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:cmsimple:cmsimple:5.15:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 11 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cmsimple
Cmsimple cmsimple |
|
| Vendors & Products |
Cmsimple
Cmsimple cmsimple |
Wed, 10 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CMSimple 5.15 contains a remote command execution vulnerability that allows authenticated attackers to modify file extensions and upload malicious PHP files. Attackers can append ',php' to Extensions_userfiles and upload a shell script to the media directory to execute arbitrary code on the server. | |
| Title | CMSimple 5.15 Remote Command Execution via Extensions Configuration | |
| Weaknesses | CWE-403 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:08:33.724Z
Reserved: 2025-12-10T14:35:24.454Z
Link: CVE-2024-58280
Updated: 2025-12-11T15:50:06.267Z
Status : Analyzed
Published: 2025-12-10T22:16:19.723
Modified: 2025-12-31T18:29:58.403
Link: CVE-2024-58280
No data.
OpenCVE Enrichment
Updated: 2025-12-11T15:16:37Z