A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the Code section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code.
The product does not adequately filter user-controlled input for special elements with control implications.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Cms_made_simple | Cmsmadesimple | 2.2.19 (including) | 2.2.19 (including) | 
| Cms_made_simple | Cmsmadesimple | 2.2.21 (including) | 2.2.21 (including) |