Description
Vvveb prior to 1.0.8.1 contains a code injection vulnerability in the installation endpoint where the subdir POST parameter is written unsanitized into the env.php configuration file without escaping or validation. Attackers can inject arbitrary PHP code by breaking out of the string context in the define statement to achieve unauthenticated remote code execution as the web server user.
Published: 2026-04-20
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Apply patch
AI Analysis

Impact

This vulnerability allows an attacker to inject arbitrary PHP code via the subdir POST parameter in the Vvveb installation endpoint. Because the parameter is written unsanitized into the env.php file, attackers can break out of a string literal and define malicious code, enabling unauthenticated remote code execution as the web‑server user. The flaw represents a classic code‑injection weakness (CWE‑94) that can be leveraged to compromise the entire application and the underlying operating system.

Affected Systems

The affected product is Vvveb from givanz, versions prior to 1.0.8.1. Any deployment running a version older than 1.0.8.1 that has the installation endpoint exposed is susceptible to exploitation.

Risk and Exploitability

The CVSS score of 9.2 signals a high severity flaw with full compromise potential. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, so current exploitation evidence is lacking, but the attack path is straightforward: an unauthenticated user can send an HTTP POST to the installation endpoint with a crafted subdir value, injecting malicious PHP into env.php and achieving remote code execution as the web‑server process. The likely attack vector is a simple HTTP request to a publicly accessible installation URL without authentication.

Generated by OpenCVE AI on April 20, 2026 at 16:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vvveb to version 1.0.8.1 or newer, which removes the unsanitized write to env.php.
  • If an upgrade is not immediately possible, disable or remove the installation endpoint to block POST requests that could be abused.
  • Ensure that env.php and other configuration files have restrictive permissions so that the web server can write only what is necessary, limiting the impact of any remaining code injection risks.

Generated by OpenCVE AI on April 20, 2026 at 16:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Givanz
Givanz vvveb
Vendors & Products Givanz
Givanz vvveb

Mon, 20 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Vvveb prior to 1.0.8.1 contains a code injection vulnerability in the installation endpoint where the subdir POST parameter is written unsanitized into the env.php configuration file without escaping or validation. Attackers can inject arbitrary PHP code by breaking out of the string context in the define statement to achieve unauthenticated remote code execution as the web server user.
Title Vvveb < 1.0.8.1 Code Injection via Installation Endpoint
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-20T15:36:55.619Z

Reserved: 2026-04-07T20:57:06.209Z

Link: CVE-2026-39918

cve-icon Vulnrichment

Updated: 2026-04-20T15:36:49.574Z

cve-icon NVD

Status : Deferred

Published: 2026-04-20T16:16:45.243

Modified: 2026-04-20T18:54:59.077

Link: CVE-2026-39918

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T16:30:06Z

Weaknesses