"TITLE":"GetSimple CMS Content Module edit.php cross site scripting",
"REQUESTER":"cna@vuldb.com",
"ASSIGNER":"cna@vuldb.com",
"STATE":"PUBLIC"
},
"generator":"vuldb.com",
"affects":{
"vendor":{
"vendor_data":[
{
"vendor_name":"GetSimple",
"product":{
"product_data":[
{
"product_name":"CMS",
"version":{
"version_data":[
{
"version_value":"n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"CWE-79 Cross Site Scripting"
}
]
}
]
},
"description":{
"description_data":[
{
"lang":"eng",
"value":"A vulnerability, which was classified as problematic, has been found in GetSimple CMS. Affected by this issue is the file /admin/edit.php of the Content Module. The manipulation of the argument post-content with an input like <script>alert(1)</script> leads to cross site scripting. The attack may be launched remotely but requires authentication. Expoit details have been disclosed within the advisory."