CVE-2020-23839

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-23839
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-23839.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-23839
Published
2020-09-01T17:15:12.310Z
Modified
2025-11-14T10:57:13.826137Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16, in the admin/index.php login portal webpage, allows remote attackers to execute JavaScript code in the client's browser and harvest login credentials after a client clicks a link, enters credentials, and submits the login form.

References

Affected packages

Git / github.com/getsimplecms/getsimplecms

Affected ranges

Type
GIT
Repo
https://github.com/getsimplecms/getsimplecms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

3.*

3.3.12
3.3.15

v3.*

v3.1.1
v3.1.2
v3.2.0
v3.2.1
v3.2.2
v3.2.3
v3.3.0
v3.3.1
v3.3.14
v3.3.14b1
v3.3.14b2
v3.3.16
v3.3.2
v3.3.3
v3.3.4
v3.3.5
v3.3.6
v3.3.7
v3.3.8

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-23839.json"