Home

Description

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, there is an authenticated SQL injection issue in the frontend user order history page in Vvveb CMS. A normal frontend user can log in and access /user/orders. The order_by and direction request parameters are accepted from the URL, propagated through the Orders component, and directly concatenated into the SQL ORDER BY clause in OrderSQL::getAll(). Because of this, attacker-controlled input reaches SQL structure without a whitelist or safe query construction step. This vulnerability is fixed in 1.0.8.3.

PUBLISHED Reserved 2026-05-13 | Published 2026-05-15 | Updated 2026-05-16 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 1.0.8.3
affected

References

github.com/.../Vvveb/security/advisories/GHSA-vwcx-w4fq-9769 exploit

github.com/.../Vvveb/security/advisories/GHSA-vwcx-w4fq-9769

cve.org (CVE-2026-45800)

nvd.nist.gov (CVE-2026-45800)

Download JSON