Skip to content
CVSS 8.8 · HIGH

CVE-2026-41934

Vvveb before version 1.0.8.2 contains an authenticated remote code execution vulnerability in the admin code editor that allows low-privilege authenticated users to execute arbitrary code by exploiting insufficient file extension restrictions. Attackers with editor, author, contributor, or site_admin roles can write a malicious .htaccess file to map arbitrary extensions to the PHP handler, then upload PHP code with that extension to achieve unauthenticated remote code execution when the file is accessed via HTTP.

Ver en NVD

Análisis

Vvveb is a niche website builder and CMS with limited adoption compared to mainstream platforms. While the vulnerability allows authenticated users to achieve remote code execution through malicious file uploads, the product's low footprint in the general developer ecosystem does not warrant a broad community alert.

Severidad

Puntaje: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-184

EPSS

Sin puntaje EPSS aún (CVE muy reciente).

Descripción técnica

Vvveb before version 1.0.8.2 contains an authenticated remote code execution vulnerability in the admin code editor that allows low-privilege authenticated users to execute arbitrary code by exploiting insufficient file extension restrictions. Attackers with editor, author, contributor, or site_admin roles can write a malicious .htaccess file to map arbitrary extensions to the PHP handler, then upload PHP code with that extension to achieve unauthenticated remote code execution when the file is accessed via HTTP.

Publicada: 6/5/2026, 19:16:37
Última modificación: 6/5/2026, 19:20:35

Referencias

InicioEventosBlogRecursosEquipo