Remote Code Execution Vulnerability in GetSimple CMS by GetSimple Development
CVE-2025-48492
8.6HIGH
What is CVE-2025-48492?
GetSimple CMS has a vulnerability in versions 3.3.16 to 3.3.21 that allows an authenticated user with Edit component access to inject arbitrary PHP code into component files. This exploit can be executed using a specially crafted query string, potentially leading to Remote Code Execution on the affected system. A patch addressing this vulnerability is set to be released in version 3.3.22.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
GetSimpleCMS-CE >= 3.3.16, <= 3.3.21
References
CVSS V4
Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
