Unrated severityNVD Advisory· Published Feb 20, 2026· Updated Feb 25, 2026
GetSimple CMS: Stored Cross-Site Scripting (XSS) via SVG File Upload (Authenticated)
CVE-2026-27147
Description
GetSimple CMS is a content management system. All versions of GetSimple CMS are vulnerable to XSS through SVG file uploads. Authenticated users can upload SVG files via the administrative upload functionality, but they are not properly sanitized or restricted, allowing an attacker to embed malicious JavaScript. When the uploaded SVG file is accessed, the script executes in the browser. This issue does not have a fix at the time of publication.
Affected products
1- Range: <= 3.3.22
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/GetSimpleCMS-CE/GetSimpleCMS-CE/security/advisories/GHSA-5gmq-hrcx-6w45mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.