Vvveb Unrestricted File Upload Leads to Remote Code Execution (CVE-2026-41938)
An unrestricted file upload vulnerability in Vvveb versions before 1.0.8.2 allows authenticated users with media upload permissions to achieve remote code execution by uploading a .htaccess file to execute arbitrary PHP code via a .phtml file.
Vvveb, a content management system, is vulnerable to an unrestricted file upload vulnerability (CVE-2026-41938) in versions prior to 1.0.8.2. This flaw allows authenticated users with the necessary media upload permissions to circumvent existing extension restrictions. By uploading a specially crafted .htaccess file, an attacker can map the .phtml extension to the PHP handler. Subsequently, they can upload a .phtml file containing malicious PHP code. The vulnerability is triggered when an unauthenticated HTTP GET request is sent to the uploaded .phtml file, leading to remote code execution on the web server. This poses a significant risk to organizations using vulnerable versions of Vvveb, potentially enabling complete system compromise.
Attack Chain
- An attacker authenticates to the Vvveb application with media upload permissions.
- The attacker uploads a .htaccess file. This file configures the webserver to interpret files with the .phtml extension as PHP code. For example, the .htaccess file might contain the line
AddType application/x-httpd-php .phtml. - The attacker uploads a .phtml file containing malicious PHP code. For example, the file might contain
<?php system($_GET['cmd']); ?>. - The Vvveb application stores the uploaded .htaccess and .phtml files in the media directory.
- The attacker sends an unauthenticated HTTP GET request to the uploaded .phtml file, including a command to execute as a parameter, such as
http://example.com/media/evil.phtml?cmd=whoami. - The web server, due to the .htaccess configuration, interprets the .phtml file as PHP code.
- The PHP interpreter executes the command specified in the HTTP GET request (
whoamiin this example). - The attacker gains remote code execution on the server with the privileges of the web server user.
Impact
Successful exploitation of CVE-2026-41938 allows an attacker to execute arbitrary code on the Vvveb server. This can lead to complete compromise of the server, including data theft, modification, or destruction. Given a CVSS v3.1 base score of 8.8, this vulnerability poses a critical risk. The scope of impact depends on the permissions of the web server user, but it could extend to other systems on the network. There is no information about observed exploitation or specific victims.
Recommendation
- Upgrade Vvveb to version 1.0.8.2 or later to patch CVE-2026-41938.
- Implement the Sigma rule “Detect Vvveb .htaccess Upload” to identify attempts to upload malicious .htaccess files.
- Deploy the Sigma rule “Detect Vvveb PHTML File Execution” to detect execution of .phtml files within the Vvveb media directory.
- Review web server access logs for suspicious requests to .phtml files, as detected by the “Detect Vvveb PHTML File Execution” rule, especially those containing command execution parameters.
Detection coverage 2
Detect Vvveb .htaccess Upload
highDetects the upload of .htaccess files which could be used to remap file handlers.
Detect Vvveb PHTML File Execution
criticalDetects the execution of PHP code from a .phtml file within the media directory, which is indicative of CVE-2026-41938 exploitation.
Detection queries are kept inside the platform. Get full rules →