Description
Vvveb before 1.0.8.3 contains an uncontrolled recursion vulnerability in the admin controller dispatch cycle where Base::init() repeatedly invokes permission() on error handlers, causing infinite recursion until PHP memory limits are exhausted. Attackers can send sustained requests to forbidden admin URLs from a low-privilege account to exhaust PHP memory on all workers and cause denial of service to legitimate traffic.
Published: 2026-05-14
Score: 7.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Vvveb before 1.0.8.3 contains an uncontrolled recursion in the admin controller dispatch cycle where Base::init() repeatedly calls permission() on error handlers, which creates an infinite loop until PHP memory limits are reached. The result is a denial of service that can affect all PHP workers. The vulnerability is classified by CWE-674 (Infinite Recursion) and CWE-209 (Information Exposure, though not directly exploited). Attackers can invoke the flaw by sending sustained requests to forbidden admin URLs from a low‑privilege account, exhausting system memory and blocking legitimate traffic. The impact is loss of availability for all users or services relying on the affected PHP processes.

Affected Systems

The affected product is the Vvveb content‑management system provided by the vendor givanz, with all releases older than 1.0.8.3 impacted. The advisory references the 1.0.8.3 release as the fixed version; any deployment running a pre‑1.0.8.3 build is vulnerable.

Risk and Exploitability

The CVSS score of 7.1 indicates a medium to high severity, and the exploit is web‑based, requiring only that the attacker can reach the admin URL space and hold a low‑privilege account. The EPSS score is not available, so the current probability of exploitation is unclear. The vulnerability is not listed in the CISA KEV catalog. Because the flaw relies on repeated memory consumption, the attack vector is sustained, low‑privilege web requests. Successful exploitation can exhaust PHP memory on all workers and result in denial of service for legitimate users.

Generated by OpenCVE AI on May 14, 2026 at 16:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Vvveb installation to version 1.0.8.3 or later, which removes the recursion bug.
  • Restrict access to the admin interface by allowing only privileged accounts and blocking low‑privilege users from accessing forbidden URLs.
  • Implement application or web‑server level rate limiting and configure PHP memory limits to mitigate excessive memory consumption if a patch is not immediately available.

Generated by OpenCVE AI on May 14, 2026 at 16:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Givanz
Givanz vvveb
Vendors & Products Givanz
Givanz vvveb

Thu, 14 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description Vvveb before 1.0.8.3 contains an uncontrolled recursion vulnerability in the admin controller dispatch cycle where Base::init() repeatedly invokes permission() on error handlers, causing infinite recursion until PHP memory limits are exhausted. Attackers can send sustained requests to forbidden admin URLs from a low-privilege account to exhaust PHP memory on all workers and cause denial of service to legitimate traffic.
Title Vvveb < 1.0.8.3 Uncontrolled Recursion Denial of Service
Weaknesses CWE-209
CWE-674
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-14T17:57:15.136Z

Reserved: 2026-04-22T18:50:43.620Z

Link: CVE-2026-41935

cve-icon Vulnrichment

Updated: 2026-05-14T17:57:06.716Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T15:16:46.020

Modified: 2026-05-14T16:24:56.240

Link: CVE-2026-41935

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T17:30:15Z

Weaknesses