An authenticated remote code execution vulnerability exists in GetSimpleCMS version 3.2.1. The application’s upload.php endpoint allows authenticated users to upload arbitrary files without proper validation of MIME types or extensions. By uploading a .pht file containing PHP code, an attacker can bypass blacklist-based restrictions and place executable code within the web root. A crafted request using a polyglot or disguised extension allows the attacker to execute the payload by accessing the file directly via the web server. This vulnerability exists due to the use of a blacklist for filtering file types instead of a whitelist.
Metrics
Affected Vendors & Products
References
History
Fri, 25 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 25 Jul 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authenticated remote code execution vulnerability exists in GetSimpleCMS version 3.2.1. The application’s upload.php endpoint allows authenticated users to upload arbitrary files without proper validation of MIME types or extensions. By uploading a .pht file containing PHP code, an attacker can bypass blacklist-based restrictions and place executable code within the web root. A crafted request using a polyglot or disguised extension allows the attacker to execute the payload by accessing the file directly via the web server. This vulnerability exists due to the use of a blacklist for filtering file types instead of a whitelist. | |
Title | GetSimple CMS 3.2.1 Authenticated RCE via Arbitrary PHP File Upload | |
Weaknesses | CWE-306 CWE-434 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-25T15:51:23.874Z
Updated: 2025-07-25T17:54:17.808Z
Reserved: 2025-07-24T20:10:35.487Z
Link: CVE-2013-10032

Updated: 2025-07-25T17:53:23.026Z

Status : Awaiting Analysis
Published: 2025-07-25T16:15:24.550
Modified: 2025-07-29T14:14:55.157
Link: CVE-2013-10032

No data.