CMSimple 5.15 contains a remote command execution vulnerability that allows authenticated attackers to modify file extensions and upload malicious PHP files. Attackers can append ',php' to Extensions_userfiles and upload a shell script to the media directory to execute arbitrary code on the server.
References
| Link | Resource |
|---|---|
| https://www.cmsimple.org | Product |
| https://www.cmsimple.org/downloads_cmsimple50/CMSimple_5-15.zip | Product |
| https://www.exploit-db.com/exploits/52040 | Exploit |
| https://www.vulncheck.com/advisories/cmsimple-remote-command-execution-via-extensions-configuration | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-10 22:16
Updated : 2025-12-31 18:29
NVD link : CVE-2024-58280
Mitre link : CVE-2024-58280
CVE.ORG link : CVE-2024-58280
JSON object : View
Products Affected
cmsimple
- cmsimple
CWE
CWE-403
Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
