An authenticated remote code execution vulnerability exists in GetSimpleCMS version 3.2.1. The application’s upload.php endpoint allows authenticated users to upload arbitrary files without proper validation of MIME types or extensions. By uploading a .pht file containing PHP code, an attacker can bypass blacklist-based restrictions and place executable code within the web root. A crafted request using a polyglot or disguised extension allows the attacker to execute the payload by accessing the file directly via the web server. This vulnerability exists due to the use of a blacklist for filtering file types instead of a whitelist.
References
Link | Resource |
---|---|
https://get-simple.info | Product |
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/get_simple_cms_upload_exec.rb | Exploit Third Party Advisory |
https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=27895 | Third Party Advisory |
https://www.exploit-db.com/exploits/25405 | Exploit VDB Entry |
https://www.fortiguard.com/encyclopedia/ips/39295 | Third Party Advisory |
https://www.vulncheck.com/advisories/getsimple-cms-auth-rce-via-arbitrary-php-file-upload | Third Party Advisory |
Configurations
History
23 Sep 2025, 23:44
Type | Values Removed | Values Added |
---|---|---|
First Time |
Get-simple getsimplecms
Get-simple |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:get-simple:getsimplecms:3.2.1:*:*:*:*:*:*:* | |
References | () https://get-simple.info - Product | |
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/get_simple_cms_upload_exec.rb - Exploit, Third Party Advisory | |
References | () https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=27895 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/25405 - Exploit, VDB Entry | |
References | () https://www.fortiguard.com/encyclopedia/ips/39295 - Third Party Advisory | |
References | () https://www.vulncheck.com/advisories/getsimple-cms-auth-rce-via-arbitrary-php-file-upload - Third Party Advisory |
29 Jul 2025, 14:14
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-25 16:15
Updated : 2025-09-23 23:44
NVD link : CVE-2013-10032
Mitre link : CVE-2013-10032
CVE.ORG link : CVE-2013-10032
JSON object : View
Products Affected
get-simple
- getsimplecms