GetSimple CMS My SMTP Contact Plugin 1.1.2 contains a PHP code injection vulnerability. An authenticated administrator can inject arbitrary PHP code through plugin configuration parameters, leading to remote code execution on the server.
References
| Link | Resource |
|---|---|
| http://get-simple.info | Product |
| https://github.com/GetSimpleCMS/GetSimpleCMS | Product |
| https://github.com/boku7/gsSMTP-Csrf2Xss2RCE/ | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/49774 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/getsimple-cms-my-smtp-contact-plugin-php-code-injection | Third Party Advisory |
Configurations
History
06 Mar 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://get-simple.info - Product | |
| References | () https://github.com/GetSimpleCMS/GetSimpleCMS - Product | |
| References | () https://github.com/boku7/gsSMTP-Csrf2Xss2RCE/ - Exploit, Third Party Advisory | |
| References | () https://www.exploit-db.com/exploits/49774 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/getsimple-cms-my-smtp-contact-plugin-php-code-injection - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
| First Time |
Get-simple
Get-simple getsimplecms |
|
| CPE | cpe:2.3:a:get-simple:getsimplecms:1.1.2:*:*:*:*:*:*:* |
21 Jan 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-21 18:16
Updated : 2026-03-06 20:15
NVD link : CVE-2021-47778
Mitre link : CVE-2021-47778
CVE.ORG link : CVE-2021-47778
JSON object : View
Products Affected
get-simple
- getsimplecms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
