Description
A weakness has been identified in givanz Vvveb up to 1.0.7.2. This vulnerability affects unknown code. Executing manipulation can lead to cross-site request forgery. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. Once again the project maintainer reacted very professional: "I accept the existence of these vulnerabilities. (...) I fixed the code to remove these vulnerabilities and will push the code to github and make a new release."
In givanz Vvveb up to 1.0.7.2 ist eine Schwachstelle entdeckt worden. Davon betroffen ist unbekannter Code. Mittels dem Manipulieren mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Die Schwachstelle wurde öffentlich offengelegt und könnte ausgenutzt werden.
Problem types
Product status
1.0.7.1
1.0.7.2
Timeline
2025-09-26: | Advisory disclosed |
2025-09-26: | VulDB entry created |
2025-09-26: | VulDB entry last update |
Credits
KhanMarshal (VulDB User)
References
vuldb.com/?id.325967 (VDB-325967 | givanz Vvveb cross-site request forgery)
vuldb.com/?ctiid.325967 (VDB-325967 | CTI Indicators (IOB, IOC))
vuldb.com/?submit.657188 (Submit #657188 | givanz Vvveb Vvveb 1.0.7.2 State-Changing GET Request)
vuldb.com/?submit.657190 (Submit #657190 | givanz Vvveb Vvveb 1.0.7.2 State-Changing GET Request (Duplicate))
vuldb.com/?submit.657191 (Submit #657191 | givanz Vvveb Vvveb 1.0.7.2 State-Changing GET Request (Duplicate))
vuldb.com/?submit.657192 (Submit #657192 | givanz Vvveb Vvveb 1.0.7.2 State-Changing GET Request (Duplicate))
gist.github.com/KhanMarshaI/165ae8f63ec6b5fdf1f4123252499fce
gist.github.com/KhanMarshaI/db888b65cfd75bead2035348babfb423