Description
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the backend admin/auth-token endpoint allows an authenticated administrator to load another administrator's REST API token list by supplying that user's admin_id. This can disclose sensitive API tokens belonging to other administrators. This vulnerability is fixed in 1.0.8.3.
Published: 2026-05-15
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Vvveb, a CMS used to build websites, blogs, and ecommerce sites, contains an IDOR flaw in its backend admin/auth-token endpoint. An authenticated administrator can send a request containing the admin_id of another administrator and receive that user’s list of REST API tokens. This flaw exposes credentials that can be used to call the CMS API with elevated privileges, potentially allowing an attacker to access sensitive data or perform actions on behalf of that administrator. The weakness stems from improper authorization checks and is classified as CWE‑639. The impact is mainly a confidentiality breach of privileged tokens, which could lead to further compromise of the system if the tokens are used maliciously.

Affected Systems

The vulnerability affects all installations of Vvveb older than version 1.0.8.3. Any site running a pre‑1.0.8.3 release is vulnerable to token disclosure via the admin/auth-token endpoint.

Risk and Exploitability

With a CVSS score of 8.1 the vulnerability is considered high severity. The EPSS score is currently unavailable, so the likelihood of exploitation is uncertain, but the fact that the vulnerability requires only an authenticated administrator account, which is typically easier to obtain than full system credentials, increases the risk. The vulnerability is not listed in CISA KEV, but the impact warrants immediate attention. An attacker who can impersonate or compromise an administrator account can exploit the IDOR to retrieve other administrators’ API tokens by simply specifying a different admin_id value in the request. The resulting disclosure could enable privileged API access, data exfiltration, or further lateral movement within the CMS. The threat remains significant even in the absence of a publicly available exploit.

Generated by OpenCVE AI on May 15, 2026 at 20:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vvveb to version 1.0.8.3 or later to remove the IDOR flaw in the admin/auth-token endpoint.
  • If an administrative account was able to access another user’s token list before patching, consider revoking or regenerating those exposed tokens and updating any integrations that rely on them.
  • Disable or remove unused administrative accounts to reduce the attack surface and prevent unauthorized token exposure.

Generated by OpenCVE AI on May 15, 2026 at 20:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Givanz
Givanz vvveb
Vendors & Products Givanz
Givanz vvveb

Fri, 15 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the backend admin/auth-token endpoint allows an authenticated administrator to load another administrator's REST API token list by supplying that user's admin_id. This can disclose sensitive API tokens belonging to other administrators. This vulnerability is fixed in 1.0.8.3.
Title Vvveb: admin/auth-token IDOR allows unauthorized disclosure of administrator REST API tokens
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T18:45:43.129Z

Reserved: 2026-05-13T21:04:10.932Z

Link: CVE-2026-46407

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-15T19:17:04.327

Modified: 2026-05-15T19:17:04.327

Link: CVE-2026-46407

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T20:45:08Z

Weaknesses