Vulnerability Details : CVE-2023-6188
Potential exploit
A vulnerability was found in GetSimpleCMS 3.3.16/3.4.0a. It has been rated as critical. This issue affects some unknown processing of the file /admin/theme-edit.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-245735.
Products affected by CVE-2023-6188
- cpe:2.3:a:get-simple:getsimplecms:3.4.0a:*:*:*:*:*:*:*
- cpe:2.3:a:get-simple:getsimplecms:3.3.16:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6188
0.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6188
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:L/Au:M/C:P/I:P/A:P |
6.4
|
6.4
|
VulDB | |
4.7
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L |
1.2
|
3.4
|
VulDB | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-6188
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: cna@vuldb.com (Primary)
References for CVE-2023-6188
-
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358
Remote command executioin vulnerability in 3.4.0a · Issue #1358 · GetSimpleCMS/GetSimpleCMS · GitHubExploit
-
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1352
Remote command execution vulnerability in 3.3.16 · Issue #1352 · GetSimpleCMS/GetSimpleCMS · GitHubExploit
-
https://vuldb.com/?ctiid.245735
CVE-2023-6188: GetSimpleCMS theme-edit.php code injectionPermissions Required
-
https://vuldb.com/?id.245735
CVE-2023-6188: GetSimpleCMS theme-edit.php code injectionThird Party Advisory
Jump to