{"api_version":"1","generated_at":"2026-04-21T09:14:46+00:00","cve":"CVE-2026-5203","urls":{"html":"https://cve.report/CVE-2026-5203","api":"https://cve.report/api/cve/CVE-2026-5203.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-5203","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-5203"},"summary":{"title":"CMS Made Simple UserGuide Module XML Import class.UserGuideImporterExporter.php _copyFilesToFolder path traversal","description":"A vulnerability was found in CMS Made Simple up to 2.2.22. This impacts the function _copyFilesToFolder in the library modules/UserGuide/lib/class.UserGuideImporterExporter.php of the component UserGuide Module XML Import. The manipulation results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. This issue has been reported early to the project. They confirmed, that \"this has already been discovered and fixed for the next release.\"","state":"PUBLISHED","assigner":"VulDB","published_at":"2026-03-31 16:16:35","updated_at":"2026-04-01 14:24:02"},"problem_types":["CWE-22","CWE-22 Path Traversal"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"5.1","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":5.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"5.1","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","data":{"baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"version":"3.1","source":"cna@vuldb.com","type":"Primary","score":"4.7","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"4.7","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","data":{"baseScore":4.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"4.7","severity":"MEDIUM","vector":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","data":{"baseScore":4.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"5.8","severity":"","vector":"AV:N/AC:L/Au:M/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"MULTIPLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"5.8","severity":"","vector":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","data":{"baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"references":[{"url":"https://drive.proton.me/urls/Q0JHZ339BW#X9P2G3Guwvwa","name":"https://drive.proton.me/urls/Q0JHZ339BW#X9P2G3Guwvwa","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/vuln/354331/cti","name":"https://vuldb.com/vuln/354331/cti","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/vuln/354331","name":"https://vuldb.com/vuln/354331","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/submit/772855","name":"https://vuldb.com/submit/772855","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-5203","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5203","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.0","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.1","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.2","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.3","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.4","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.5","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.6","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.7","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.8","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.9","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.10","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.11","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.12","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.13","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.14","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.15","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.16","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.17","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.18","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.19","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.20","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.21","platforms":[]},{"source":"CNA","vendor":"n/a","product":"CMS Made Simple","version":"affected 2.2.22","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-03-31T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2026-03-31T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2026-03-31T10:45:27.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"caginkyr (VulDB User)","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"5203","cve":"CVE-2026-5203","epss":"0.000520000","percentile":"0.161300000","score_date":"2026-04-07","updated_at":"2026-04-08 00:03:40"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-5203","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-31T17:35:26.772515Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-31T17:35:35.625Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"cpes":["cpe:2.3:a:cms_made_simple:cms_made_simple:*:*:*:*:*:*:*:*"],"modules":["UserGuide Module XML Import"],"product":"CMS Made Simple","vendor":"n/a","versions":[{"status":"affected","version":"2.2.0"},{"status":"affected","version":"2.2.1"},{"status":"affected","version":"2.2.2"},{"status":"affected","version":"2.2.3"},{"status":"affected","version":"2.2.4"},{"status":"affected","version":"2.2.5"},{"status":"affected","version":"2.2.6"},{"status":"affected","version":"2.2.7"},{"status":"affected","version":"2.2.8"},{"status":"affected","version":"2.2.9"},{"status":"affected","version":"2.2.10"},{"status":"affected","version":"2.2.11"},{"status":"affected","version":"2.2.12"},{"status":"affected","version":"2.2.13"},{"status":"affected","version":"2.2.14"},{"status":"affected","version":"2.2.15"},{"status":"affected","version":"2.2.16"},{"status":"affected","version":"2.2.17"},{"status":"affected","version":"2.2.18"},{"status":"affected","version":"2.2.19"},{"status":"affected","version":"2.2.20"},{"status":"affected","version":"2.2.21"},{"status":"affected","version":"2.2.22"}]}],"credits":[{"lang":"en","type":"reporter","value":"caginkyr (VulDB User)"}],"descriptions":[{"lang":"en","value":"A vulnerability was found in CMS Made Simple up to 2.2.22. This impacts the function _copyFilesToFolder in the library modules/UserGuide/lib/class.UserGuideImporterExporter.php of the component UserGuide Module XML Import. The manipulation results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. This issue has been reported early to the project. They confirmed, that \"this has already been discovered and fixed for the next release.\""}],"metrics":[{"cvssV4_0":{"baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"cvssV3_1":{"baseScore":4.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"cvssV3_0":{"baseScore":4.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"cvssV2_0":{"baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"Path Traversal","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-31T15:45:08.773Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-354331 | CMS Made Simple UserGuide Module XML Import class.UserGuideImporterExporter.php _copyFilesToFolder path traversal","tags":["vdb-entry","technical-description"],"url":"https://vuldb.com/vuln/354331"},{"name":"VDB-354331 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/vuln/354331/cti"},{"name":"Submit #772855 | CMSMadeSimple CMS Made Simple (CMSMS) 2.2.22 and old versions modules/UserGuide/lib/class.UserGuideImporterExporter.php","tags":["third-party-advisory"],"url":"https://vuldb.com/submit/772855"},{"tags":["exploit"],"url":"https://drive.proton.me/urls/Q0JHZ339BW#X9P2G3Guwvwa"}],"tags":["x_open-source"],"timeline":[{"lang":"en","time":"2026-03-31T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2026-03-31T02:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2026-03-31T10:45:27.000Z","value":"VulDB entry last update"}],"title":"CMS Made Simple UserGuide Module XML Import class.UserGuideImporterExporter.php _copyFilesToFolder path traversal"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2026-5203","datePublished":"2026-03-31T15:45:08.773Z","dateReserved":"2026-03-31T08:40:14.589Z","dateUpdated":"2026-03-31T17:35:35.625Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-31 16:16:35","lastModifiedDate":"2026-04-01 14:24:02","problem_types":["CWE-22","CWE-22 Path Traversal"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":5.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.2,"impactScore":3.4}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"MULTIPLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":6.4,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"5203","Ordinal":"1","Title":"CMS Made Simple UserGuide Module XML Import class.UserGuideImpor","CVE":"CVE-2026-5203","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"5203","Ordinal":"1","NoteData":"A vulnerability was found in CMS Made Simple up to 2.2.22. This impacts the function _copyFilesToFolder in the library modules/UserGuide/lib/class.UserGuideImporterExporter.php of the component UserGuide Module XML Import. The manipulation results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. This issue has been reported early to the project. They confirmed, that \"this has already been discovered and fixed for the next release.\"","Type":"Description","Title":"CMS Made Simple UserGuide Module XML Import class.UserGuideImpor"}]}}}