GetSimple CMS My SMTP Contact Plugin 1.1.1 contains a cross-site request forgery (CSRF) vulnerability. Attackers can craft a malicious webpage that, when visited by an authenticated administrator, can change SMTP configuration settings in the plugin. This may allow unauthorized changes but does not directly enable remote code execution.
References
| Link | Resource |
|---|---|
| http://get-simple.info | Product |
| https://github.com/GetSimpleCMS/GetSimpleCMS | Product |
| https://www.exploit-db.com/exploits/49774 | Exploit Third Party Advisory VDB Entry |
| https://www.exploit-db.com/exploits/49798 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/getsimple-cms-my-smtp-contact-plugin-csrf | Third Party Advisory |
Configurations
History
06 Mar 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Get-simple
Get-simple getsimplecms |
|
| CPE | cpe:2.3:a:get-simple:getsimplecms:1.1.1:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| References | () http://get-simple.info - Product | |
| References | () https://github.com/GetSimpleCMS/GetSimpleCMS - Product | |
| References | () https://www.exploit-db.com/exploits/49774 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.exploit-db.com/exploits/49798 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/getsimple-cms-my-smtp-contact-plugin-csrf - Third Party Advisory |
21 Jan 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-21 18:16
Updated : 2026-03-06 20:15
NVD link : CVE-2021-47830
Mitre link : CVE-2021-47830
CVE.ORG link : CVE-2021-47830
JSON object : View
Products Affected
get-simple
- getsimplecms
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
