A vulnerability, which was classified as problematic, has been found in GetSimple CMS. Affected by this issue is the file /admin/edit.php of the Content Module. The manipulation of the argument post-content with an input like <script>alert(1)</script> leads to cross site scripting. The attack may be launched remotely but requires authentication. Expoit details have been disclosed within the advisory.
History

Tue, 15 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-04-15T14:41:14.964Z

Reserved: 2022-04-27T00:00:00.000Z

Link: CVE-2022-1503

cve-icon Vulnrichment

Updated: 2024-08-03T00:03:06.360Z

cve-icon NVD

Status : Modified

Published: 2022-04-27T08:15:37.813

Modified: 2024-11-21T06:40:51.250

Link: CVE-2022-1503

cve-icon Redhat

No data.