Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-41931
PUBLISHED
More InfoOfficial Page
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 18:36
Updated At-06 May, 2026 | 19:42
Rejected At-
▼CVE Numbering Authority (CNA)
Vvveb < 1.0.8.2 Information Disclosure via Debug Exception Handler

Vvveb before version 1.0.8.2 contains an information disclosure vulnerability that allows unauthenticated attackers to obtain sensitive server information by triggering unhandled exceptions in the password-reset module. Attackers can access the admin password-reset endpoint to trigger a fatal error caused by a missing namespace import, which exposes the absolute server file path, internal class namespaces, line numbers, and source code excerpts through the debug exception handler rendered to unauthenticated requests.

Affected Products
Vendor
givanz
Product
Vvveb
Default Status
affected
Versions
Affected
  • From 0 before 1.0.8.2 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-1188CWE-1188
CWECWE-209CWE-209 Generation of Error Message Containing Sensitive Information
Type: CWE
CWE ID: CWE-1188
Description: CWE-1188
Type: CWE
CWE ID: CWE-209
Description: CWE-209 Generation of Error Message Containing Sensitive Information
Metrics
VersionBase scoreBase severityVector
4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Basant Kumar (@CyberWarrior9)
finder
Hamed Kohi (@0xhamy)
finder
VulnCheck
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/givanz/Vvveb/releases/tag/1.0.8.2
release-notes
https://github.com/givanz/Vvveb/security/advisories/GHSA-xgvg-r47g-786r
vendor-advisory
https://www.vulncheck.com/advisories/vvveb-information-disclosure-via-debug-exception-handler
third-party-advisory
Hyperlink: https://github.com/givanz/Vvveb/releases/tag/1.0.8.2
Resource:
release-notes
Hyperlink: https://github.com/givanz/Vvveb/security/advisories/GHSA-xgvg-r47g-786r
Resource:
vendor-advisory
Hyperlink: https://www.vulncheck.com/advisories/vvveb-information-disclosure-via-debug-exception-handler
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/givanz/Vvveb/security/advisories/GHSA-xgvg-r47g-786r
exploit
Hyperlink: https://github.com/givanz/Vvveb/security/advisories/GHSA-xgvg-r47g-786r
Resource:
exploit
Details not found