get-simple CVE Vulnerabilities & Metrics

Focus on get-simple vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About get-simple Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with get-simple. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total get-simple CVEs: 37
Earliest CVE date: 05 Oct 2011, 10:55 UTC
Latest CVE date: 12 Nov 2024, 15:15 UTC

Latest CVE reference: CVE-2024-11125

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -75.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -75.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical get-simple CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.0

Max CVSS: 6.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 14
4.0-6.9 28
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS get-simple CVEs

These are the five CVEs with the highest CVSS scores for get-simple, sorted by severity first and recency.

All CVEs for get-simple

CVE-2024-11125 get-simple vulnerability CVSS: 5.0 12 Nov 2024, 15:15 UTC

A vulnerability was found in GetSimpleCMS 3.3.16 and classified as problematic. This issue affects some unknown processing of the file /admin/profile.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2023-51246 get-simple vulnerability CVSS: 0 08 Jan 2024, 20:15 UTC

A Cross Site Scripting (XSS) vulnerability in GetSimple CMS 3.3.16 exists when using Source Code Mode as a backend user to add articles via the /admin/edit.php page.

CVE-2023-6188 get-simple vulnerability CVSS: 5.8 17 Nov 2023, 18:15 UTC

A vulnerability was found in GetSimpleCMS 3.3.16/3.4.0a. It has been rated as critical. This issue affects some unknown processing of the file /admin/theme-edit.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-245735.

CVE-2023-46040 get-simple vulnerability CVSS: 0 31 Oct 2023, 02:15 UTC

Cross Site Scripting vulnerability in GetSimpleCMS v.3.4.0a allows a remote attacker to execute arbitrary code via the a crafted payload to the components.php function.

CVE-2023-46042 get-simple vulnerability CVSS: 0 19 Oct 2023, 15:15 UTC

An issue in GetSimpleCMS v.3.4.0a allows a remote attacker to execute arbitrary code via a crafted payload to the phpinfo().

CVE-2022-41544 get-simple vulnerability CVSS: 0 18 Oct 2022, 15:15 UTC

GetSimple CMS v3.3.16 was discovered to contain a remote code execution (RCE) vulnerability via the edited_file parameter in admin/theme-edit.php.

CVE-2022-1503 get-simple vulnerability CVSS: 3.5 27 Apr 2022, 08:15 UTC

A vulnerability, which was classified as problematic, has been found in GetSimple CMS. Affected by this issue is the file /admin/edit.php of the Content Module. The manipulation of the argument post-content with an input like <script>alert(1)</script> leads to cross site scripting. The attack may be launched remotely but requires authentication. Expoit details have been disclosed within the advisory.

CVE-2021-36601 get-simple vulnerability CVSS: 4.3 10 Aug 2021, 15:15 UTC

GetSimpleCMS 3.3.16 contains a cross-site Scripting (XSS) vulnerability, where Function TSL does not filter check settings.php Website URL: "siteURL" parameter.

CVE-2020-21353 get-simple vulnerability CVSS: 3.5 06 Aug 2021, 23:15 UTC

A stored cross site scripting (XSS) vulnerability in /admin/snippets.php of GetSimple CMS 3.4.0a allows attackers to execute arbitrary web scripts or HTML via crafted payload in the Edit Snippets module.

CVE-2020-18660 get-simple vulnerability CVSS: 5.8 23 Jun 2021, 21:15 UTC

GetSimpleCMS <=3.3.15 has an open redirect in admin/changedata.php via the redirect function to the url parameter.

CVE-2020-18659 get-simple vulnerability CVSS: 4.3 23 Jun 2021, 19:15 UTC

Cross Site Scripting vulnerability in GetSimpleCMS <=3.3.15 via the (1) sitename, (2) username, and (3) email parameters to /admin/setup.php

CVE-2020-18658 get-simple vulnerability CVSS: 4.3 23 Jun 2021, 19:15 UTC

Cross Site Scriptiong (XSS) vulnerability in GetSimpleCMS <=3.3.15 via the timezone parameter to settings.php.

CVE-2020-18657 get-simple vulnerability CVSS: 4.3 23 Jun 2021, 19:15 UTC

Cross Site Scripting (XSS) vulnerability in GetSimpleCMS <= 3.3.15 in admin/changedata.php via the redirect_url parameter and the headers_sent function.

CVE-2020-20391 get-simple vulnerability CVSS: 3.5 23 Jun 2021, 15:15 UTC

Cross Site Scripting vulnerability in GetSimpleCMS 3.4.0a in admin/snippets.php via (1) Add Snippet and (2) Save snippets.

CVE-2020-20389 get-simple vulnerability CVSS: 3.5 23 Jun 2021, 15:15 UTC

Cross Site Scripting (XSS) vulnerability in GetSimpleCMS 3.4.0a in admin/edit.php.

CVE-2021-28977 get-simple vulnerability CVSS: 3.5 23 Jun 2021, 13:15 UTC

Cross Site Scripting vulnerability in GetSimpleCMS 3.3.16 in admin/upload.php by adding comments or jpg and other file header information to the content of xla, pages, and gzip files,

CVE-2021-28976 get-simple vulnerability CVSS: 6.5 23 Jun 2021, 13:15 UTC

Remote Code Execution vulnerability in GetSimpleCMS before 3.3.16 in admin/upload.php via phar filess.

CVE-2020-18191 get-simple vulnerability CVSS: 6.4 02 Oct 2020, 14:15 UTC

GetSimpleCMS-3.3.15 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /GetSimpleCMS-3.3.15/admin/log.php

CVE-2020-24861 get-simple vulnerability CVSS: 3.5 01 Oct 2020, 14:15 UTC

GetSimple CMS 3.3.16 allows in parameter 'permalink' on the Settings page persistent Cross Site Scripting which is executed when you create and open a new page

CVE-2020-23839 get-simple vulnerability CVSS: 4.3 01 Sep 2020, 17:15 UTC

A Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16, in the admin/index.php login portal webpage, allows remote attackers to execute JavaScript code in the client's browser and harvest login credentials after a client clicks a link, enters credentials, and submits the login form.

CVE-2013-1420 get-simple vulnerability CVSS: 4.3 02 Jan 2020, 21:15 UTC

Multiple cross-site scripting (XSS) vulnerabilities in GetSimple CMS before 3.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to backup-edit.php; (2) title or (3) menu parameter to edit.php; or (4) path or (5) returnid parameter to filebrowser.php in admin/. NOTE: the path parameter in admin/upload.php vector is already covered by CVE-2012-6621.

CVE-2019-16333 get-simple vulnerability CVSS: 3.5 15 Sep 2019, 22:15 UTC

GetSimple CMS v3.3.15 has Persistent Cross-Site Scripting (XSS) in admin/theme-edit.php.

CVE-2019-11231 get-simple vulnerability CVSS: 5.0 22 May 2019, 18:29 UTC

An issue was discovered in GetSimple CMS through 3.3.15. insufficient input sanitation in the theme-edit.php file allows upload of files with arbitrary content (PHP code, for example). This vulnerability is triggered by an authenticated user; however, authentication can be bypassed. According to the official documentation for installation step 10, an admin is required to upload all the files, including the .htaccess files, and run a health check. However, what is overlooked is that the Apache HTTP Server by default no longer enables the AllowOverride directive, leading to data/users/admin.xml password exposure. The passwords are hashed but this can be bypassed by starting with the data/other/authorization.xml API key. This allows one to target the session state, since they decided to roll their own implementation. The cookie_name is crafted information that can be leaked from the frontend (site name and version). If a someone leaks the API key and the admin username, then they can bypass authentication. To do so, they need to supply a cookie based on an SHA-1 computation of this known information. The vulnerability exists in the admin/theme-edit.php file. This file checks for forms submissions via POST requests, and for the csrf nonce. If the nonce sent is correct, then the file provided by the user is uploaded. There is a path traversal allowing write access outside the jailed themes directory root. Exploiting the traversal is not necessary because the .htaccess file is ignored. A contributing factor is that there isn't another check on the extension before saving the file, with the assumption that the parameter content is safe. This allows the creation of web accessible and executable files with arbitrary content.

CVE-2018-19845 get-simple vulnerability CVSS: 3.5 31 Dec 2018, 15:29 UTC

There is Stored XSS in GetSimple CMS 3.3.12 via the admin/edit.php "post-menu" parameter, a related issue to CVE-2018-16325.

CVE-2018-19421 get-simple vulnerability CVSS: 4.0 21 Nov 2018, 21:29 UTC

In GetSimpleCMS 3.3.15, admin/upload.php blocks .html uploads but Internet Explorer render HTML elements in a .eml file, because of admin/upload-uploadify.php, and validate_safe_file in admin/inc/security_functions.php.

CVE-2018-19420 get-simple vulnerability CVSS: 4.0 21 Nov 2018, 21:29 UTC

In GetSimpleCMS 3.3.15, admin/upload.php blocks .html uploads but there are several alternative cases in which HTML can be executed, such as a file with no extension or an unrecognized extension (e.g., the test or test.asdf filename), because of admin/upload-uploadify.php, and validate_safe_file in admin/inc/security_functions.php.

CVE-2018-17835 get-simple vulnerability CVSS: 3.5 01 Oct 2018, 08:29 UTC

An issue was discovered in GetSimple CMS 3.3.15. An administrator can insert stored XSS via the admin/settings.php Custom Permalink Structure parameter, which injects the XSS payload into any page created at the admin/pages.php URI.

CVE-2018-17103 get-simple vulnerability CVSS: 6.8 16 Sep 2018, 21:29 UTC

An issue was discovered in GetSimple CMS v3.3.13. There is a CSRF vulnerability that can change the administrator's password via admin/settings.php. NOTE: The vendor reported that the PoC was sending a value for the nonce parameter

CVE-2018-16325 get-simple vulnerability CVSS: 4.3 01 Sep 2018, 22:29 UTC

There is XSS in GetSimple CMS 3.4.0.9 via the admin/edit.php title field.

CVE-2018-15843 get-simple vulnerability CVSS: 3.5 25 Aug 2018, 21:29 UTC

GetSimple CMS 3.3.14 has XSS via the admin/edit.php "Add New Page" field.

CVE-2018-9173 get-simple vulnerability CVSS: 4.3 02 Apr 2018, 03:29 UTC

Cross-site scripting (XSS) vulnerability in admin/template/js/uploadify/uploadify.swf in GetSimple CMS 3.3.13 allows remote attackers to inject arbitrary web script or HTML, as demonstrated by the movieName parameter.

CVE-2017-10673 get-simple vulnerability CVSS: 4.3 29 Jun 2017, 08:29 UTC

admin/profile.php in GetSimple CMS 3.x has XSS in a name field.

CVE-2014-8723 get-simple vulnerability CVSS: 5.0 17 Mar 2017, 14:59 UTC

GetSimple CMS 3.3.4 allows remote attackers to obtain sensitive information via a direct request to (1) plugins/anonymous_data.php or (2) plugins/InnovationPlugin.php, which reveals the installation path in an error message.

CVE-2014-8722 get-simple vulnerability CVSS: 5.0 17 Mar 2017, 14:59 UTC

GetSimple CMS 3.3.4 allows remote attackers to obtain sensitive information via a direct request to (1) data/users/<username>.xml, (2) backups/users/<username>.xml.bak, (3) data/other/authorization.xml, or (4) data/other/appid.xml.

CVE-2015-5356 get-simple vulnerability CVSS: 4.3 01 Jul 2015, 16:59 UTC

Cross-site scripting (XSS) vulnerability in admin/filebrowser.php in GetSimple CMS before 3.3.6 allows remote attackers to inject arbitrary web script or HTML via the func parameter.

CVE-2015-5355 get-simple vulnerability CVSS: 4.3 01 Jul 2015, 16:59 UTC

Multiple cross-site scripting (XSS) vulnerabilities in GetSimple CMS before 3.3.6 allow remote attackers to inject arbitrary web script or HTML via the (1) post-content or (2) post-title parameter to admin/edit.php.

CVE-2014-8790 get-simple vulnerability CVSS: 5.0 20 Jan 2015, 15:59 UTC

XML external entity (XXE) vulnerability in admin/api.php in GetSimple CMS 3.1.1 through 3.3.x before 3.3.5 Beta 1, when in certain configurations, allows remote attackers to read arbitrary files via the data parameter.

CVE-2014-1603 get-simple vulnerability CVSS: 4.3 14 May 2014, 19:55 UTC

Multiple cross-site scripting (XSS) vulnerabilities in GetSimple CMS 3.3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) param parameter to admin/load.php or (2) user, (3) email, or (4) name parameter in a Save Settings action to admin/settings.php.

CVE-2013-7243 get-simple vulnerability CVSS: 4.3 17 Jan 2014, 15:18 UTC

Multiple cross-site scripting (XSS) vulnerabilities in GetSimple CMS 3.1.2 and 3.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) post-menu field to edit.php or (2) Display name field to settings.php. NOTE: The Custom Permalink Structure and Email Address fields are already covered by CVE-2012-6621.

CVE-2012-6621 get-simple vulnerability CVSS: 4.3 16 Jan 2014, 21:55 UTC

Multiple cross-site scripting (XSS) vulnerabilities in GetSimple CMS 3.1, 3.1.2, 3.2.3, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) Email Address or (2) Custom Permalink Structure fields in admin/settings.php; (3) path parameter to admin/upload.php; (4) err parameter to admin/theme.php; (5) error parameter to admin/pages.php; or (6) success or (7) err parameter to admin/index.php.

CVE-2010-5052 get-simple vulnerability CVSS: 4.3 23 Nov 2011, 01:55 UTC

Cross-site scripting (XSS) vulnerability in admin/components.php in GetSimple CMS 2.01 allows remote attackers to inject arbitrary web script or HTML via the val[] parameter.

CVE-2010-4863 get-simple vulnerability CVSS: 4.3 05 Oct 2011, 10:55 UTC

Cross-site scripting (XSS) vulnerability in admin/changedata.php in GetSimple CMS 2.01 allows remote attackers to inject arbitrary web script or HTML via the post-title parameter.