Vvveb Unrestricted File Upload Vulnerability (CVE-2026-41937)
Vvveb before 1.0.8.3 is vulnerable to unrestricted file upload, allowing super_admin users to execute arbitrary PHP code by uploading a malicious plugin ZIP file containing PHP code which is then accessible via HTTP requests.
Vvveb is vulnerable to an unrestricted file upload vulnerability (CVE-2026-41937) affecting versions prior to 1.0.8.3. The vulnerability exists in the plugin upload endpoint, allowing super_admin users to upload arbitrary files. An attacker can exploit this by crafting a malicious plugin ZIP file containing a plugin.php file with a valid Slug header, alongside a public/index.php file containing arbitrary PHP code. Upon uploading this malicious plugin, the PHP code within public/index.php becomes accessible via unauthenticated HTTP requests to the plugin’s public path, resulting in remote code execution (RCE) as the web server user.
Attack Chain
- An attacker identifies a Vvveb instance running a version prior to 1.0.8.3.
- The attacker authenticates as a
super_adminuser. - The attacker crafts a malicious ZIP archive containing two files:
plugin.phpandpublic/index.php. - The
plugin.phpfile includes a validSlugheader to bypass initial checks. - The
public/index.phpfile contains arbitrary PHP code intended for execution. - The attacker uploads the crafted ZIP file through the plugin upload endpoint.
- The Vvveb application extracts the ZIP file, placing the
public/index.phpin a publicly accessible directory. - The attacker sends an unauthenticated HTTP request to the
public/index.phpfile’s URL, triggering the execution of the embedded PHP code on the server.
Impact
Successful exploitation of this vulnerability leads to arbitrary PHP code execution on the Vvveb server. This allows an attacker with super_admin privileges to gain complete control of the affected Vvveb instance, potentially leading to data breaches, defacement, or further lateral movement within the network. Due to the unrestricted nature of the file upload, attackers can deploy backdoors, execute system commands, and compromise the confidentiality, integrity, and availability of the application and underlying system.
Recommendation
- Upgrade Vvveb to version 1.0.8.3 or later to patch CVE-2026-41937.
- Implement the Sigma rule “Detect CVE-2026-41937 Exploitation Attempt — Vvveb Plugin Upload” to detect malicious plugin uploads based on HTTP request characteristics.
- Restrict access to the plugin upload endpoint to authorized personnel only.
- Monitor web server logs for suspicious activity, particularly requests to newly uploaded PHP files.
Detection coverage 2
Detect CVE-2026-41937 Exploitation Attempt — Vvveb Plugin Upload
highDetects CVE-2026-41937 exploitation — an attempt to upload a malicious plugin in Vvveb containing PHP code in public/index.php
Detect Vvveb public/index.php Access
mediumDetects access to public/index.php within Vvveb plugins directory, which could indicate exploitation of CVE-2026-41937 after malicious file upload.
Detection queries are available on the platform. Get full rules →