Vulnerabilities
Vulnerable Software
Cmsimple-Xh:  Security Vulnerabilities
CMSimple_XH 1.7.4 contains an authenticated remote code execution vulnerability in the content editing functionality that allows administrative users to upload malicious PHP files. Attackers with valid credentials can exploit the CSRF token mechanism to create a PHP shell file that enables arbitrary command execution on the server.
CVSS Score
7.2
EPSS Score
0.006
Published
2025-12-23
An unauthenticated reflected cross-site scripting vulnerability in the query handling of CMSimpleXH allows remote attackers to inject and execute arbitrary JavaScript in a victim's browser via a crafted request (e.g., a maliciously crafted POST login). Successful exploitation may lead to theft of session cookies, credential disclosure, or other client-side impacts.
CVSS Score
7.1
EPSS Score
0.001
Published
2025-11-06
A reflected XSS vulnerability exists in CMSimple_XH 1.8's index.php router when attacker-controlled path segments are not sanitized or encoded before being inserted into the generated HTML (navigation links, breadcrumbs, search form action, footer links). An attacker-controlled string placed in the URL path is reflected into multiple HTML elements, allowing execution of arbitrary JavaScript in victims' browsers visiting a crafted URL.
CVSS Score
7.1
EPSS Score
0.001
Published
2025-11-06
CMSimple_XH 1.7.6 allows XSS by uploading a crafted SVG document.
CVSS Score
6.1
EPSS Score
0.004
Published
2024-06-21
CMSimple_XH 1.7.4 is affected by a remote code execution (RCE) vulnerability. To exploit this vulnerability, an attacker must use the "File" parameter to upload a PHP payload to get a reverse shell from the vulnerable host.
CVSS Score
10.0
EPSS Score
0.069
Published
2022-05-10


Contact Us

Shodan ® - All rights reserved