Description
GetSimple CMS My SMTP Contact Plugin 1.1.1 contains a cross-site request forgery (CSRF) vulnerability. Attackers can craft a malicious webpage that, when visited by an authenticated administrator, can change SMTP configuration settings in the plugin. This may allow unauthorized changes but does not directly enable remote code execution.
Problem types
Cross-Site Request Forgery (CSRF)
Product status
Credits
Bobby Cooke (boku)
References
www.exploit-db.com/exploits/49774 (ExploitDB-49774)
www.exploit-db.com/exploits/49798 (ExploitDB-49798)
get-simple.info (GetSimple CMS Webpage)
github.com/GetSimpleCMS/GetSimpleCMS (GetSimple CMS GitHub Repository)
www.vulncheck.com/...tsimple-cms-my-smtp-contact-plugin-csrf (VulnCheck Advisory: GetSimple CMS My SMTP Contact Plugin 1.1.1 - CSRF)