{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T07:47:27.599","vulnerabilities":[{"cve":{"id":"CVE-2024-27625","sourceIdentifier":"cve@mitre.org","published":"2024-03-05T14:15:49.160","lastModified":"2025-03-28T16:07:53.420","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"CMS Made Simple Version 2.2.19 is vulnerable to Cross Site Scripting (XSS). This vulnerability resides in the File Manager module of the admin panel. Specifically, the issue arises due to inadequate sanitization of user input in the \"New directory\" field."},{"lang":"es","value":"CMS Made Simple versión 2.2.19 es vulnerable a Cross Site Scripting (XSS). Esta vulnerabilidad reside en el módulo Administrador de archivos del panel de administración. Específicamente, el problema surge debido a una sanitización inadecuada de la entrada del usuario en el campo \"Nuevo directorio\"."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.19:*:*:*:*:*:*:*","matchCriteriaId":"BB09A515-0F41-407D-AD7B-908F4341358A"}]}]}],"references":[{"url":"https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html","source":"cve@mitre.org","tags":["Exploit","VDB Entry"]},{"url":"https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","VDB Entry"]}]}}]}