Object Injection Vulnerability in CMS Made Simple by CMS Made Simple
CVE-2019-9055
Key Information:
- Vendor
- Cmsmadesimple
- Status
- Vendor
- CVE Published:
- 26 March 2019
Badges
Summary
An issue in CMS Made Simple version 2.2.8 enables a malicious user with Designer permission to exploit the DesignManager module via crafted parameters. This leads to an unserialize operation that can execute arbitrary objects, posing a significant security threat. The flaw resides in the action.admin_bulk_css.php and action.admin_bulk_template.php files, where improper validation allows an attacker to manipulate the m1_allparms parameter to achieve object injection, potentially compromising the integrity of the affected system.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
31% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved