Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:getsimple-ce:getsimple_cms:*:*:*:*:community:*:*:* |
Wed, 11 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getsimple-ce
Getsimple-ce getsimple Cms |
|
| Vendors & Products |
Getsimple-ce
Getsimple-ce getsimple Cms |
Tue, 10 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GetSimple CMS is a content management system. The massiveAdmin plugin (v6.0.3) bundled with GetSimpleCMS-CE v3.3.22 allows an authenticated administrator to overwrite the gsconfig.php configuration file with arbitrary PHP code via the gsconfig editor module. The form lacks CSRF protection, enabling a remote unauthenticated attacker to exploit this via Cross-Site Request Forgery against a logged-in admin, achieving Remote Code Execution (RCE) on the web server. | |
| Title | GetSimple CMS has CSRF to Remote Code Execution via Arbitrary PHP Write in gsconfig.php | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-10T19:51:57.515Z
Reserved: 2026-02-27T20:57:47.708Z
Link: CVE-2026-28495
Updated: 2026-03-10T19:51:52.847Z
Status : Analyzed
Published: 2026-03-10T20:16:37.663
Modified: 2026-03-12T18:21:10.780
Link: CVE-2026-28495
No data.
OpenCVE Enrichment
Updated: 2026-04-16T03:30:06Z