GetSimple CMS My SMTP Contact Plugin 1.1.2 suffers from a Stored Cross-Site Scripting (XSS) vulnerability. The plugin attempts to sanitize user input using htmlspecialchars(), but this can be bypassed by passing dangerous characters as escaped hex bytes. This allows attackers to inject arbitrary client-side code that executes in the administrator's browser when visiting a malicious page.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 22 Jan 2026 02:45:00 +0900

Type Values Removed Values Added
Description GetSimple CMS My SMTP Contact Plugin 1.1.2 suffers from a Stored Cross-Site Scripting (XSS) vulnerability. The plugin attempts to sanitize user input using htmlspecialchars(), but this can be bypassed by passing dangerous characters as escaped hex bytes. This allows attackers to inject arbitrary client-side code that executes in the administrator's browser when visiting a malicious page.
Title GetSimple CMS My SMTP Contact Plugin 1.1.2 - Stored XSS
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-21T17:32:09.385Z

Reserved: 2026-01-18T12:35:05.171Z

Link: CVE-2021-47870

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-21T18:16:19.423

Modified: 2026-01-21T18:16:19.423

Link: CVE-2021-47870

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses