Home

Description

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the checkout endpoint accepts a user-controlled cart_id and uses it to enter the payment flow without verifying cart ownership. A logged-in attacker can therefore reuse another user's cart data in their own checkout session. This vulnerability is fixed in 1.0.8.3.

PUBLISHED Reserved 2026-05-13 | Published 2026-05-15 | Updated 2026-05-15 | Assigner GitHub_M




HIGH: 7.6CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

< 1.0.8.3
affected

References

github.com/.../Vvveb/security/advisories/GHSA-rmh2-wv73-xpqh exploit

github.com/.../Vvveb/security/advisories/GHSA-rmh2-wv73-xpqh

cve.org (CVE-2026-46408)

nvd.nist.gov (CVE-2026-46408)

Download JSON