Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-41936
Deferred
More InfoOfficial Page
Source-disclosure@vulncheck.com
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 19:16
Updated At-06 May, 2026 | 20:16

Vvveb before version 1.0.8.2 contains an XML external entity (XXE) injection vulnerability in the admin Tools/Import feature that allows authenticated site_admin users to read arbitrary files and modify database records. Attackers can exploit the XML parser configuration in system/import/xml.php to inject file:// or php://filter entity references that are resolved and persisted into the application database, enabling arbitrary file disclosure and administrator password hash overwriting for privilege escalation.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.6HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.18.1HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Type: Secondary
Version: 4.0
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-611Secondarydisclosure@vulncheck.com
CWE ID: CWE-611
Type: Secondary
Source: disclosure@vulncheck.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/givanz/Vvveb/commit/86f7128a18edebe0ff47e3855558467eb0ef9106disclosure@vulncheck.com
N/A
https://github.com/givanz/Vvveb/releases/tag/1.0.8.2disclosure@vulncheck.com
N/A
https://github.com/givanz/Vvveb/security/advisories/GHSA-rfxr-4xpm-wrp7disclosure@vulncheck.com
N/A
https://www.vulncheck.com/advisories/vvveb-xml-external-entity-injection-via-importdisclosure@vulncheck.com
N/A
https://github.com/givanz/Vvveb/security/advisories/GHSA-rfxr-4xpm-wrp7134c704f-9b21-4f2e-91b3-4a467353bcc0
N/A
Hyperlink: https://github.com/givanz/Vvveb/commit/86f7128a18edebe0ff47e3855558467eb0ef9106
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/givanz/Vvveb/releases/tag/1.0.8.2
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/givanz/Vvveb/security/advisories/GHSA-rfxr-4xpm-wrp7
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://www.vulncheck.com/advisories/vvveb-xml-external-entity-injection-via-import
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/givanz/Vvveb/security/advisories/GHSA-rfxr-4xpm-wrp7
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource: N/A
Change History
0Changes found

Details not found