CVE-2021-47870

Source
https://cve.org/CVERecord?id=CVE-2021-47870
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47870.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-47870
Published
2026-01-21T18:16:19.423Z
Modified
2026-03-13T07:54:23.151270Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

GetSimple CMS My SMTP Contact Plugin 1.1.2 suffers from a Stored Cross-Site Scripting (XSS) vulnerability. The plugin attempts to sanitize user input using htmlspecialchars(), but this can be bypassed by passing dangerous characters as escaped hex bytes. This allows attackers to inject arbitrary client-side code that executes in the administrator's browser when visiting a malicious page.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "1.1.2"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47870.json"