CVE-2026-27202
Published: 21 February 2026
Summary
CVE-2026-27202 is a high-severity Path Traversal (CWE-22) vulnerability in Getsimple-Ce Getsimple Cms. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 8.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Validates pathnames and filenames to prevent traversal outside intended directories.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing GetSimple CMS directly enables remote exploitation of the web application (T1190) and arbitrary local file reads for data collection (T1005).
NVD Description
GetSimple CMS is a content management system. All versions of GetSimple CMS have a flaw in the Uploaded Files feature that allows for arbitrary file reads. This issue has not been fixed at the time of publication.
Deeper analysisAI
CVE-2026-27202 affects all versions of GetSimple CMS, a content management system. The vulnerability is a flaw in the Uploaded Files feature that enables arbitrary file reads, mapped to CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-23 (Relative Path Traversal). Published on 2026-02-21, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact.
Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Exploitation grants access to read arbitrary files on the affected server, potentially exposing sensitive data such as configuration files, user credentials, or other server contents.
The GitHub security advisory (GHSA-xhwv-g6q4-h886) notes that no fix is available as of publication. Security practitioners should monitor for updates from the GetSimpleCMS-CE repository and consider restricting access to upload functionalities or implementing web application firewalls to detect path traversal attempts in the interim.
Details
- CWE(s)