Description
Vvveb prior to 1.0.8.1 contains a stored cross-site scripting vulnerability that allows authenticated users with media upload and rename permissions to execute arbitrary JavaScript by bypassing MIME type validation and renaming uploaded files to executable extensions. Attackers can prepend a GIF89a header to HTML/JavaScript payloads to bypass upload validation, rename the file to .html extension, and execute malicious scripts in an administrator's browser session to create backdoor accounts and upload malicious plugins for remote code execution.
Published: 2026-04-20
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: Stored Cross‑Site Scripting leading to potential account takeover and remote code execution
Action: Patch immediately
AI Analysis

Impact

Vvveb versions prior to 1.0.8.1 contain a stored cross‑site scripting flaw that allows authenticated users with media upload and rename rights to inject arbitrary JavaScript. By appending a GIF89a header to an HTML/JavaScript payload and then renaming the file to a .html extension, the attacker can execute malicious code in the browser of any administrator who later opens the file. The injected script can create backdoor accounts and upload malicious plugins, ultimately enabling remote code execution. The weakness is a classic CWE‑79 stored XSS.

Affected Systems

The vulnerability affects the Vvveb content‑management system, specifically any installation running a version earlier than 1.0.8.1. Only users who are authenticated and have permissions to upload and rename media files are able to exploit the flaw; administrators applying the fix should upgrade to the released 1.0.8.1 or later, which removes the MIME type bypass and filename‑change loophole.

Risk and Exploitability

The CVSS score of 5.1 reflects moderate severity, but the lack of an EPSS score means there is currently no publicly available data on exploitation probability. The flaw is not listed in the CISA KEV catalog. Because exploitable only by authenticated users with specific file‑handling permissions, the risk depends on the strength of access controls and user credentials. However, once a file is executed, the attacker can gain a fresh administrative account and upload code that can run on the server, effectively providing a backdoor for remote code execution. Consequently, organizations that host Vvveb sites should treat this as a high‑risk vulnerability if their CMS is exposed to untrusted users or has weak authentication mechanisms.

Generated by OpenCVE AI on April 20, 2026 at 15:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vvveb to version 1.0.8.1 or later
  • Limit media upload and rename permissions to trusted administrators only; consider disabling rename of uploaded files
  • Enforce strict MIME type validation on server‑side uploads and reject files with non‑matching extensions or content types; block .html and other executable extensions in media upload directories

Generated by OpenCVE AI on April 20, 2026 at 15:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Givanz
Givanz vvveb
Vendors & Products Givanz
Givanz vvveb

Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description Vvveb prior to 1.0.8.1 contains a stored cross-site scripting vulnerability that allows authenticated users with media upload and rename permissions to execute arbitrary JavaScript by bypassing MIME type validation and renaming uploaded files to executable extensions. Attackers can prepend a GIF89a header to HTML/JavaScript payloads to bypass upload validation, rename the file to .html extension, and execute malicious scripts in an administrator's browser session to create backdoor accounts and upload malicious plugins for remote code execution.
Title Vvveb < 1.0.8.1 Stored XSS via Media Upload and Rename
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-20T14:56:19.205Z

Reserved: 2026-03-27T15:24:06.752Z

Link: CVE-2026-34429

cve-icon Vulnrichment

Updated: 2026-04-20T14:56:14.248Z

cve-icon NVD

Status : Deferred

Published: 2026-04-20T16:16:44.650

Modified: 2026-04-20T18:54:59.077

Link: CVE-2026-34429

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T16:30:06Z

Weaknesses