Home

Description

A weakness has been identified in givanz Vvvebjs up to 2.0.5. The affected element is an unknown function of the file upload.php of the component File Upload Endpoint. This manipulation of the argument uploadAllowExtensions causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. Patch name: 8cac22cff99b8bc701c408aa8e887fa702755336. Applying a patch is the recommended action to fix this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

PUBLISHED Reserved 2026-04-05 | Published 2026-04-06 | Updated 2026-04-06 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
MEDIUM: 4.3CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
5.0AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C

Problem types

Cross Site Scripting

Code Injection

Product status

2.0.0
affected

2.0.1
affected

2.0.2
affected

2.0.3
affected

2.0.4
affected

2.0.5
affected

Timeline

2026-04-05:Advisory disclosed
2026-04-05:VulDB entry created
2026-04-05:VulDB entry last update

Credits

EthX0_ (VulDB User) reporter

VulDB CNA Team coordinator

References

vuldb.com/vuln/355406 (VDB-355406 | givanz Vvvebjs File Upload Endpoint upload.php cross site scripting) vdb-entry technical-description

vuldb.com/vuln/355406/cti (VDB-355406 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/785563 (Submit #785563 | givanz VvvebJs 2.0.5 Stored XSS) third-party-advisory

tcn60zf28jhk.feishu.cn/...fFkI9Vyc3oX2n0f?from=from_copylink exploit

github.com/...ommit/8cac22cff99b8bc701c408aa8e887fa702755336 patch

github.com/givanz/VvvebJs/ product

cve.org (CVE-2026-5615)

nvd.nist.gov (CVE-2026-5615)

Download JSON