Home

Description

Vvveb before version 1.0.8.2 contains an authenticated remote code execution vulnerability in the admin code editor that allows low-privilege authenticated users to execute arbitrary code by exploiting insufficient file extension restrictions. Attackers with editor, author, contributor, or site_admin roles can write a malicious .htaccess file to map arbitrary extensions to the PHP handler, then upload PHP code with that extension to achieve unauthenticated remote code execution when the file is accessed via HTTP.

PUBLISHED Reserved 2026-04-22 | Published 2026-05-06 | Updated 2026-05-08 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Incomplete List of Disallowed Inputs

Product status

Default status
affected

Any version before 1.0.8.2
affected

Credits

Basant Kumar (@CyberWarrior9) finder

Hamed Kohi (@0xhamy) finder

VulnCheck finder

References

github.com/givanz/Vvveb/releases/tag/1.0.8.2 release-notes

github.com/.../Vvveb/security/advisories/GHSA-vfjj-gcvv-w248 vendor-advisory

github.com/...ommit/1196561276a3f49da5a714fef89ac9a6c6f9e33b patch

www.vulncheck.com/...vvveb-authenticated-rce-via-code-editor third-party-advisory

cve.org (CVE-2026-41934)

nvd.nist.gov (CVE-2026-41934)

Download JSON