Home

Description

Vvveb before 1.0.8.3 contains a stored cross-site scripting vulnerability in the customer signup flow where the Signup::addUser() controller copies raw POST username values into the display_name field before sanitization occurs. Attackers can submit HTML and script markup in the username field during signup, which gets stripped from the username column but persisted verbatim in the display_name column, allowing stored XSS execution when display_name is rendered without encoding in vulnerable views.

PUBLISHED Reserved 2026-04-22 | Published 2026-05-14 | Updated 2026-05-14 | Assigner VulnCheck




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N

MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
affected

Any version before 1.0.8.3
affected

fefac290a8c85d3c87fe80ffed68b6c5bc50e93c (git)
unaffected

Credits

Basant Kumar (@CyberWarrior9) finder

VulnCheck finder

References

github.com/givanz/Vvveb/releases/tag/1.0.8.3 release-notes

github.com/...ommit/fefac290a8c85d3c87fe80ffed68b6c5bc50e93c patch

www.vulncheck.com/.../vvveb-stored-xss-via-signup-controller third-party-advisory

cve.org (CVE-2026-41932)

nvd.nist.gov (CVE-2026-41932)

Download JSON