Skip to content
CVSS 8.8 · HIGH

CVE-2026-41934

Vvveb before version 1.0.8.2 contains an authenticated remote code execution vulnerability in the admin code editor that allows low-privilege authenticated users to execute arbitrary code by exploiting insufficient file extension restrictions. Attackers with editor, author, contributor, or site_admin roles can write a malicious .htaccess file to map arbitrary extensions to the PHP handler, then upload PHP code with that extension to achieve unauthenticated remote code execution when the file is accessed via HTTP.

View on NVD

Analysis

Vvveb is a niche website builder and CMS with limited adoption compared to mainstream platforms. While the vulnerability allows authenticated users to achieve remote code execution through malicious file uploads, the product's low footprint in the general developer ecosystem does not warrant a broad community alert.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-184

EPSS

No EPSS score yet (CVE may be too fresh).

Technical description

Vvveb before version 1.0.8.2 contains an authenticated remote code execution vulnerability in the admin code editor that allows low-privilege authenticated users to execute arbitrary code by exploiting insufficient file extension restrictions. Attackers with editor, author, contributor, or site_admin roles can write a malicious .htaccess file to map arbitrary extensions to the PHP handler, then upload PHP code with that extension to achieve unauthenticated remote code execution when the file is accessed via HTTP.

Published: 5/6/2026, 7:16:37 PM
Last modified: 5/6/2026, 7:20:35 PM

References

HomeEventsBlogResourcesTeam