Arbitrary Code Execution in CMS Made Simple by Local Attackers
CVE-2023-43352
7.8HIGH
Key Information:
- Vendor
- Cmsmadesimple
- Status
- Vendor
- CVE Published:
- 26 October 2023
Badges
👾 Exploit Exists🟡 Public PoC
Summary
A local attacker can exploit a flaw in CMS Made Simple version 2.2.18 to execute arbitrary code. The vulnerability arises in the Content Manager Menu component, where crafted payloads can manipulate the system, posing risks to security and data integrity. Immediate protective measures are recommended to mitigate potential exploitation.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
- 🟡
Public PoC available
- 👾
Exploit known to exist