Home

Description

EN DE

A vulnerability was identified in givanz Vvveb up to 1.0.7.2. Affected by this issue is some unknown functionality of the component SVG File Handler. Such manipulation leads to cross site scripting. The attack may be launched remotely. The exploit is publicly available and might be used. Once again the project maintainer reacted very professional: "I accept the existence of these vulnerabilities. (...) I fixed the code to remove these vulnerabilities and will push the code to github and make a new release."

Es wurde eine Schwachstelle in givanz Vvveb up to 1.0.7.2 entdeckt. Dabei betrifft es einen unbekannter Codeteil der Komponente SVG File Handler. Durch die Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-09-26 | Published 2025-09-26 | Updated 2025-09-26 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 2.4CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:C
LOW: 2.4CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:C
3.3AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:C

Problem types

Cross Site Scripting

Code Injection

Product status

1.0.7.0
affected

1.0.7.1
affected

1.0.7.2
affected

Timeline

2025-09-26:Advisory disclosed
2025-09-26:VulDB entry created
2025-09-26:VulDB entry last update

Credits

KhanMarshal (VulDB User) reporter

References

vuldb.com/?id.325965 (VDB-325965 | givanz Vvveb SVG File cross site scripting) vdb-entry

vuldb.com/?ctiid.325965 (VDB-325965 | CTI Indicators (IOB, IOC, TTP)) signature permissions-required

vuldb.com/?submit.657184 (Submit #657184 | givanz Vvveb Vvveb 1.0.7.2 File Upload) third-party-advisory

gist.github.com/KhanMarshaI/b90045ee823866a52f33615776b5a6ec exploit

cve.org (CVE-2025-11027)

nvd.nist.gov (CVE-2025-11027)

Download JSON