Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-41936
PUBLISHED
More InfoOfficial Page
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 18:27
Updated At-08 May, 2026 | 14:04
Rejected At-
▼CVE Numbering Authority (CNA)
Vvveb < 1.0.8.2 XML External Entity Injection via Import

Vvveb before version 1.0.8.2 contains an XML external entity (XXE) injection vulnerability in the admin Tools/Import feature that allows authenticated site_admin users to read arbitrary files and modify database records. Attackers can exploit the XML parser configuration in system/import/xml.php to inject file:// or php://filter entity references that are resolved and persisted into the application database, enabling arbitrary file disclosure and administrator password hash overwriting for privilege escalation.

Affected Products
Vendor
givanz
Product
Vvveb
Default Status
affected
Versions
Affected
  • From 0 before 1.0.8.2 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-611Improper Restriction of XML External Entity Reference
Type: CWE
CWE ID: CWE-611
Description: Improper Restriction of XML External Entity Reference
Metrics
VersionBase scoreBase severityVector
4.08.6HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
3.18.1HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Version: 4.0
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Basant Kumar (@CyberWarrior9)
finder
VulnCheck
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/givanz/Vvveb/releases/tag/1.0.8.2
release-notes
https://github.com/givanz/Vvveb/security/advisories/GHSA-rfxr-4xpm-wrp7
vendor-advisory
https://github.com/givanz/Vvveb/commit/86f7128a18edebe0ff47e3855558467eb0ef9106
patch
https://www.vulncheck.com/advisories/vvveb-xml-external-entity-injection-via-import
third-party-advisory
Hyperlink: https://github.com/givanz/Vvveb/releases/tag/1.0.8.2
Resource:
release-notes
Hyperlink: https://github.com/givanz/Vvveb/security/advisories/GHSA-rfxr-4xpm-wrp7
Resource:
vendor-advisory
Hyperlink: https://github.com/givanz/Vvveb/commit/86f7128a18edebe0ff47e3855558467eb0ef9106
Resource:
patch
Hyperlink: https://www.vulncheck.com/advisories/vvveb-xml-external-entity-injection-via-import
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/givanz/Vvveb/security/advisories/GHSA-rfxr-4xpm-wrp7
exploit
Hyperlink: https://github.com/givanz/Vvveb/security/advisories/GHSA-rfxr-4xpm-wrp7
Resource:
exploit
Details not found