GetSimple CMS v3.3.16 was discovered to contain a remote code execution (RCE) vulnerability via the edited_file parameter in admin/theme-edit.php.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1352 | issue tracking exploit third party advisory |
http://packetstormsecurity.com/files/172553/GetSimple-CMS-3.3.16-Shell-Upload.html |