4.3
CVSSv2

CVE-2020-23839

Published: 01/09/2020 Updated: 03/12/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

A Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16, in the admin/index.php login portal webpage, allows remote malicious users to execute JavaScript code in the client's browser and harvest login credentials after a client clicks a link, enters credentials, and submits the login form.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

get-simple getsimple cms 3.3.16

Exploits

GetSimple CMS version 3316 cross site scripting to remote shell upload exploit ...

Github Repositories

Public PoC Disclosure for CVE-2020-23839 - GetSimple CMS v3.3.16 suffers from a Reflected XSS on the Admin Login Portal

CVE-2020-23839 | GetSimple CMS v3316 - Reflected XSS to RCE Exploit Author: Bobby Cooke (boku) Vulnerability Statistics OWASP Top Ten 2017: A7:2017-Cross-Site Scripting (XSS) CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - Type 1: Reflected XSS CVSS Base Score: 61 MEDIUM CVSS v31 Vector: CVSS:31/AV:N/AC:L/PR:N/UI:R