GetSimple CMS Custom JS 0.1 plugin contains a cross-site request forgery vulnerability that allows unauthenticated attackers to inject arbitrary client-side code into administrator browsers. Attackers can craft a malicious website that triggers a cross-site scripting payload to execute remote code on the hosting server when an authenticated administrator visits the page.
History

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Get-simple
Get-simple getsimplecms
Vendors & Products Get-simple
Get-simple getsimplecms

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 17:45:00 +0000

Type Values Removed Values Added
Description GetSimple CMS Custom JS 0.1 plugin contains a cross-site request forgery vulnerability that allows unauthenticated attackers to inject arbitrary client-side code into administrator browsers. Attackers can craft a malicious website that triggers a cross-site scripting payload to execute remote code on the hosting server when an authenticated administrator visits the page.
Title GetSimple CMS Custom JS 0.1 - CSRF to XSS to RCE
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-01-21T17:29:56.337Z

Updated: 2026-01-22T16:51:09.944Z

Reserved: 2026-01-18T12:35:05.169Z

Link: CVE-2021-47860

cve-icon Vulnrichment

Updated: 2026-01-22T16:48:14.805Z

cve-icon NVD

Status : Received

Published: 2026-01-21T18:16:17.100

Modified: 2026-01-21T18:16:17.100

Link: CVE-2021-47860

cve-icon Redhat

No data.