Cross-Site Request Forgery Vulnerability in GetSimple CMS My SMTP Contact Plugin
CVE-2021-47830
Key Information:
- Vendor
Getsimple Cms
- Status
- Vendor
- CVE Published:
- 21 January 2026
Badges
What is CVE-2021-47830?
The My SMTP Contact Plugin for GetSimple CMS version 1.1.1 is susceptible to a cross-site request forgery (CSRF) vulnerability. This flaw enables attackers to create a malicious webpage that, when accessed by an authenticated administrator, can lead to unauthorized modifications of SMTP configuration settings. While this vulnerability does not directly allow for remote code execution, it poses a significant risk by allowing unauthorized changes to crucial email sending configurations, potentially compromising the security of communications sent through the plugin.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
My SMTP Contact Plugin 1.1.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
