CVE-2026-27147 PUBLISHED

GetSimple CMS: Stored Cross-Site Scripting (XSS) via SVG File Upload (Authenticated)

Assigner: GitHub_M
Reserved: 18.02.2026 Published: 20.02.2026 Updated: 20.02.2026

GetSimple CMS is a content management system. All versions of GetSimple CMS are vulnerable to XSS through SVG file uploads. Authenticated users can upload SVG files via the administrative upload functionality, but they are not properly sanitized or restricted, allowing an attacker to embed malicious JavaScript. When the uploaded SVG file is accessed, the script executes in the browser. This issue does not have a fix at the time of publication.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6.9

Product Status

Vendor GetSimpleCMS-CE
Product GetSimpleCMS-CE
Versions
  • Version <= 3.3.22 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE