Description
Vvveb before 1.0.8.3 contains an unrestricted file upload vulnerability in the plugin upload endpoint that allows super_admin users to execute arbitrary PHP code by uploading a malicious plugin ZIP file. Attackers can craft a ZIP containing a plugin.php with a valid Slug header and a public/index.php file with arbitrary PHP code, which executes as the web server user when accessed via unauthenticated HTTP requests to the plugin's public path.
Published: 2026-05-14
Score: 8.6 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability allows super_admin users to upload a crafted ZIP file to the plugin upload endpoint. Once uploaded, the plugin’s plugin.php and public/index.php files contain arbitrary PHP code that runs as the web server user. This can lead to full compromise of the affected site, including data exfiltration, defacement, and installing backdoors. It is a classic Unrestricted File Upload flaw (CWE-434) combined with path traversal (CWE-61).

Affected Systems

The affected vendor is givanz, product Vvveb. Versions prior to 1.0.8.3 are vulnerable. Anyone running an older Vvveb build and having super_admin rights can exploit this.

Risk and Exploitability

The CVSS score of 8.6 indicates high severity. EPSS is not available, so the exploitation probability remains uncertain, but the known exploitation path is straightforward: an attacker with administrative credentials uploads a malicious ZIP, then visits the public path to trigger the code. The vulnerability is not listed in CISA KEV, implying no known targeted exploitation yet. Nevertheless, the ability to run arbitrary code via a web request makes this a critical risk for exposed installations. The attack vector likely originates from authenticated super_admin actions, but once the plugin is uploaded, the code can be triggered via unauthenticated HTTP calls.

Generated by OpenCVE AI on May 14, 2026 at 16:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vvveb to version 1.0.8.3 or later to remove the vulnerability.
  • Restrict access to the plugin upload endpoint by disabling it for non‑super_admin users or implementing stricter role checks.
  • Apply web application firewall rules that block or filter suspicious file uploads and block execution of arbitrary PHP files.

Generated by OpenCVE AI on May 14, 2026 at 16:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Givanz
Givanz vvveb
Vendors & Products Givanz
Givanz vvveb

Thu, 14 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description Vvveb before 1.0.8.3 contains an unrestricted file upload vulnerability in the plugin upload endpoint that allows super_admin users to execute arbitrary PHP code by uploading a malicious plugin ZIP file. Attackers can craft a ZIP containing a plugin.php with a valid Slug header and a public/index.php file with arbitrary PHP code, which executes as the web server user when accessed via unauthenticated HTTP requests to the plugin's public path.
Title Vvveb < 1.0.8.3 Unrestricted File Upload RCE via Plugin Upload
Weaknesses CWE-434
CWE-61
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-14T15:59:15.370Z

Reserved: 2026-04-22T18:50:43.621Z

Link: CVE-2026-41937

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-14T15:16:46.190

Modified: 2026-05-14T16:24:56.240

Link: CVE-2026-41937

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T17:00:15Z

Weaknesses