CVE-2025-8976

A vulnerability has been found in givanz Vvveb up to 1.0.5. This vulnerability affects unknown code of the file /vadmin123/index.php?module=content/post&type=post of the component Endpoint. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.6 is able to address this issue. It is recommended to upgrade the affected component.
References
Link Resource
https://github.com/givanz/Vvveb/releases/tag/1.0.6 Release Notes
https://hkohi.ca/vulnerability/7 Exploit Third Party Advisory
https://vuldb.com/?ctiid.319972 Permissions Required VDB Entry
https://vuldb.com/?id.319972 Third Party Advisory VDB Entry
https://vuldb.com/?submit.628297 Third Party Advisory VDB Entry
https://vuldb.com/?submit.628297 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:vvveb:vvveb:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-08-14 19:15

Updated : 2025-08-18 15:03


NVD link : CVE-2025-8976

Mitre link : CVE-2025-8976

CVE.ORG link : CVE-2025-8976


JSON object : View

Products Affected

vvveb

  • vvveb
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')