Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.1

GetSimple CMS: Unprotected File Upload Allows Unauthorized File Upload

CVE-2026-27146
Summary

GetSimple CMS, a content management system, does not protect against unauthorized file uploads. This means an attacker can trick a logged-in user into uploading malicious files without their knowledge. To fix this, consider updating to a newer version or using a different CMS that has proper security protection.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
getsimple-ce getsimple_cms <= 3.3.22
Original title
GetSimple CMS is a content management system. All versions of GetSimple CMS do not implement CSRF protection on the administrative file upload endpoint. As a result, an attacker can craft a malicio...
Original description
GetSimple CMS is a content management system. All versions of GetSimple CMS do not implement CSRF protection on the administrative file upload endpoint. As a result, an attacker can craft a malicious web page that silently triggers a file upload request from an authenticated victim’s browser. The request is accepted without requiring a CSRF token or origin validation. This allows an attacker to upload arbitrary files to the application without the victim’s knowledge or consent. In order to exploit this vulnerability, the victim must be authenticated to GetSimple CMS (e.g., admin user), and visit an attacker-controlled webpage. This issue does not have a fix at the time of publication.
nvd CVSS3.1 4.5
nvd CVSS4.0 7.1
Vulnerability type
CWE-352 Cross-Site Request Forgery (CSRF)
CWE-434 Unrestricted File Upload
Published: 21 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026