Cross-Site Request Forgery Vulnerability in GetSimple CMS My SMTP Contact Plugin
CVE-2021-47830
Key Information:
- Vendor
Getsimple Cms
- Status
- Vendor
- CVE Published:
- 21 January 2026
Badges
What is CVE-2021-47830?
The My SMTP Contact Plugin for GetSimple CMS version 1.1.1 is susceptible to a cross-site request forgery (CSRF) vulnerability. This flaw enables attackers to create a malicious webpage that, when accessed by an authenticated administrator, can lead to unauthorized modifications of SMTP configuration settings. While this vulnerability does not directly allow for remote code execution, it poses a significant risk by allowing unauthorized changes to crucial email sending configurations, potentially compromising the security of communications sent through the plugin.
Affected Version(s)
My SMTP Contact Plugin 1.1.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
