Description
Vvveb before version 1.0.8.2 contains an XML external entity (XXE) injection vulnerability in the admin Tools/Import feature that allows authenticated site_admin users to read arbitrary files and modify database records. Attackers can exploit the XML parser configuration in system/import/xml.php to inject file:// or php://filter entity references that are resolved and persisted into the application database, enabling arbitrary file disclosure and administrator password hash overwriting for privilege escalation.
Published: 2026-05-06
Score: 8.6 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Vvveb versions prior to 1.0.8.2 contain an XML External Entity (XXE) injection flaw in the Admin Tools/Import functionality. The vulnerability is active only for authenticated site_admin users and allows them to craft XML payloads that refer to file:// or php://filter entity references. When processed by the application’s XML parser, these references are resolved and the resulting data is persisted to the database. Consequently, attackers can read arbitrary files on the hosting server and overwrite critical database records, including the administrator password hash, enabling full privilege escalation. The weakness is classified as CWE‑611 and can lead to both confidentiality and integrity compromise.

Affected Systems

The affected product is Vvveb as provided by the vendor givanz. All deployments using any Vvveb release earlier than 1.0.8.2 are vulnerable. No additional sub‑versions are specified beyond the stated cutoff.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity risk. EPSS data is unavailable, and the vulnerability is not currently listed in the CISA KEV catalog. Exploitation requires the attacker to be logged in as a site_admin, making the assault an authenticated attack. Attackers can construct malicious XML imports, trigger the parser to resolve external entities, and thereby access local files or modify protected database entries. Because the flaw permits both arbitrary file disclosure and password hash overwriting, the impact ranges from confidential data exposure to full administrative takeover. The primary attack vector is through the Import feature within the administrative interface, leveraging the XML parser configuration. Given the high CVSS score and the vulnerable functionality’s privileged nature, the risk to affected sites is significant.

Generated by OpenCVE AI on May 6, 2026 at 20:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vvveb to version 1.0.8.2 or later to eliminate the vulnerable XML parser configuration.
  • Disable or remove the Import feature for non‑admin accounts and restrict file upload paths to prevent XML-based attacks.
  • Configure the application’s XML parser to disallow external entity resolution and enable secure processing options, ensuring that file:// or php://filter references cannot be evaluated.

Generated by OpenCVE AI on May 6, 2026 at 20:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Givanz
Givanz vvveb
Vendors & Products Givanz
Givanz vvveb

Wed, 06 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 19:15:00 +0000

Type Values Removed Values Added
Description Vvveb before version 1.0.8.2 contains an XML external entity (XXE) injection vulnerability in the admin Tools/Import feature that allows authenticated site_admin users to read arbitrary files and modify database records. Attackers can exploit the XML parser configuration in system/import/xml.php to inject file:// or php://filter entity references that are resolved and persisted into the application database, enabling arbitrary file disclosure and administrator password hash overwriting for privilege escalation.
Title Vvveb < 1.0.8.2 XML External Entity Injection via Import
Weaknesses CWE-611
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-06T19:25:51.012Z

Reserved: 2026-04-22T18:50:43.620Z

Link: CVE-2026-41936

cve-icon Vulnrichment

Updated: 2026-05-06T19:25:25.732Z

cve-icon NVD

Status : Deferred

Published: 2026-05-06T19:16:37.550

Modified: 2026-05-06T20:16:32.880

Link: CVE-2026-41936

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T23:00:14Z

Weaknesses