CVE-2021-47860
CSRF in GetSimple CMS Custom JS Plugin Enables Remote Code Execution
Publication date: 2026-01-21
Last updated on: 2026-03-06
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| get-simple | getsimplecms | 0.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the GetSimple CMS Custom JS plugin version 0.1 is a chained attack starting with Cross-Site Request Forgery (CSRF) that allows unauthenticated remote attackers to inject arbitrary client-side JavaScript code into the browsers of authenticated administrators. When an administrator visits a malicious website, this injected code executes (Stored Cross-Site Scripting - XSS), which then performs further actions to inject PHP code into the CMS theme files. This PHP code acts as a webshell, enabling Remote Code Execution (RCE) on the hosting server. Essentially, attackers exploit the trust between the administrator's browser and the CMS to execute arbitrary commands on the server without needing authentication. [1, 2, 4]
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized remote code execution on the hosting server. Attackers can gain full control over the server by injecting malicious code through the administrator's browser session. This can lead to data breaches, server compromise, unauthorized access to sensitive information, defacement, or disruption of services hosted on the server. Since the attack requires only that an authenticated administrator visits a malicious webpage, it bypasses normal authentication controls and can be exploited remotely without prior access. [1, 2, 4]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves monitoring for signs of CSRF and XSS attacks targeting the GetSimple CMS Custom JS plugin version 0.1. Since the exploit involves injection of malicious JavaScript via crafted POST requests to the CMS admin interface, you can detect suspicious POST requests to endpoints like /admin/theme-edit.php or requests containing parameters such as 'customjs_js_content' or 'customhs_js_content'. Network monitoring tools or web application firewalls (WAF) can be configured to alert on such patterns. Additionally, reviewing server logs for unexpected POST requests or the presence of webshell files like 'webshell.php' can help detect exploitation. Specific commands depend on your environment, but examples include using curl or wget to test the endpoints, or grep to search logs for suspicious activity. For example, to search Apache logs for suspicious POST requests: `grep 'POST /admin/theme-edit.php' /var/log/apache2/access.log` or to find webshell files: `find /var/www/html -name 'webshell.php'`. [2, 3, 4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1) Updating or removing the vulnerable Custom JS plugin version 0.1 from your GetSimple CMS installation, as it contains the CSRF to XSS to RCE vulnerability. 2) Restricting access to the CMS admin interface to trusted IP addresses or networks to reduce exposure. 3) Implementing or enhancing CSRF protections such as anti-CSRF tokens in the CMS. 4) Educating administrators to avoid visiting untrusted or suspicious websites while logged into the CMS. 5) Monitoring for and removing any injected malicious JavaScript or webshell files on the server. 6) Applying web application firewall (WAF) rules to block suspicious POST requests targeting the plugin endpoints. Since the vulnerability requires user interaction (an admin visiting a malicious page), reducing this risk is critical. [1, 2, 4]