Browse all 5 CVE security advisories affecting Simple SA. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Simple SA is a software application primarily used for small business accounting and inventory management. Historically, it has been vulnerable to multiple remote code execution (RCE) flaws, cross-site scripting (XSS) issues, and privilege escalation vulnerabilities. The application's five recorded CVEs reveal a pattern of insufficient input validation and access control weaknesses. While no major public security incidents have been documented, the consistent presence of critical vulnerabilities in its history suggests potential risks for organizations relying on this software for financial operations. Regular patching and hardening are recommended due to the recurring nature of these security issues.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-1198 | SQL Injection in SIMPLE.ERP — Simple.ERPCWE-89 | 8.8AI | HighAI | 2026-02-26 |
| CVE-2025-12140 | RCE in Wirtualna Uczelnia — Wirtualna UczelniaCWE-95 | 9.8 | - | 2025-11-27 |
| CVE-2025-9339 | SQL Injection in SIMPLE.ERP — SIMPLE.ERPCWE-89 | 7.1AI | HighAI | 2025-10-21 |
| CVE-2024-8774 | Privilege Escalation in SIMPLE.ERP — SIMPLE.ERPCWE-257 | 8.8AI | HighAI | 2025-03-24 |
| CVE-2024-8773 | Protocol Downgrade in SIMPLE.ERP — SIMPLE.ERPCWE-757 | 9.1AI | CriticalAI | 2025-03-24 |
This page lists every published CVE security advisory associated with Simple SA. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.