Looking for the vulnerability index of Invicti's legacy products?
Local File Inclusion (CMS Made Simple) - Vulnerability Database

Local File Inclusion (CMS Made Simple)

Description

CMS Made Simple version 2.2.1 contains a Local File Inclusion (LFI) vulnerability that allows authenticated administrators to include and execute arbitrary files from the server's filesystem. This vulnerability enables attackers with high-level privileges to access sensitive files outside the intended application directory, potentially leading to information disclosure or remote code execution.

Remediation

Upgrade CMS Made Simple to version 2.2.2 or later, which addresses this vulnerability. Follow these steps:

1. Back up your current CMS installation and database before proceeding
2. Download CMS Made Simple version 2.2.2 or later from the official website (https://www.cmsmadesimple.org)
3. Follow the official upgrade documentation to apply the update
4. After upgrading, verify the installation is functioning correctly
5. Review administrator account access and remove any unnecessary privileged accounts
6. Monitor application logs for any suspicious file access patterns that may indicate prior exploitation

If immediate patching is not possible, restrict administrative access to trusted IP addresses only and implement additional monitoring for unusual file access attempts.