Impact
Vvveb versions earlier than 1.0.8.1 contain a server-side request forgery in the editor/editor module when a backend authenticated user supplies an arbitrary URL to the oEmbedProxy action. The supplied URL is passed unvalidated to a curl call, allowing web-server readable files to be read via file:// URLs or internal HTTP requests to probe the internal network. The vulnerability can leak sensitive files or network information, exposing confidential data but not enabling direct code execution. It is identified as CWE-918.
Affected Systems
This flaw affects the Vvveb web-content management system from givanz. Versions prior to 1.0.8.1 are vulnerable; later releases contain the fix.
Risk and Exploitability
The CVSS score of 8.3 marks the issue as high severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. Attack requires authenticated backend access; therefore external attackers would need to compromise valid credentials. Once exploited, an attacker could read arbitrary files or enumerate internal services, giving significant confidentiality damage.
OpenCVE Enrichment