Vvveb Uncontrolled Recursion Denial of Service (CVE-2026-41935)
Vvveb before version 1.0.8.3 is vulnerable to an uncontrolled recursion vulnerability in the admin controller dispatch cycle that allows a low-privilege attacker to cause denial of service by exhausting PHP memory.
Vvveb is susceptible to an uncontrolled recursion vulnerability (CVE-2026-41935) affecting versions prior to 1.0.8.3. The vulnerability lies within the admin controller dispatch cycle, specifically how Base::init() repeatedly invokes permission() on error handlers. This recursion occurs when a low-privilege account attempts to access forbidden admin URLs. By sending sustained requests, an attacker can exhaust the PHP memory on all workers, leading to a denial-of-service condition that impacts legitimate traffic. This vulnerability poses a significant risk to web applications using Vvveb, as even a low-privilege account can trigger a widespread outage.
Attack Chain
- Attacker obtains a low-privilege account on the Vvveb application.
- Attacker identifies forbidden admin URLs (e.g.,
/admin/config). - Attacker crafts HTTP requests targeting these forbidden admin URLs.
- The requests are sent to the Vvveb server.
- The server’s admin controller dispatch cycle initiates.
- Due to insufficient permissions,
Base::init()invokespermission()on error handlers. - The error handler triggers a recursive call back to
permission(), repeating infinitely. - This uncontrolled recursion exhausts PHP memory limits on all workers, causing a denial-of-service condition.
Impact
Successful exploitation of this vulnerability leads to a denial-of-service condition affecting all users of the Vvveb application. While the vulnerability requires a low-privilege account, the resulting impact can be severe, potentially disrupting critical services and causing financial losses. The CVSS v3.1 base score is 7.1, indicating a high risk of exploitation and potential damage. The number of affected victims depends on the popularity and deployment size of the Vvveb instance.
Recommendation
- Upgrade Vvveb to version 1.0.8.3 or later to patch CVE-2026-41935; reference the advisory in the references section.
- Deploy the Sigma rule “Detect CVE-2026-41935 Exploitation Attempt - Multiple 403 Errors” to identify potential exploitation attempts by monitoring web server logs for frequent 403 errors.
- Monitor web server resource consumption (CPU, memory) for unexpected spikes, which could indicate a denial-of-service attack stemming from the uncontrolled recursion.
Detection coverage 1
Detect CVE-2026-41935 Exploitation Attempt - Multiple 403 Errors
mediumDetects CVE-2026-41935 exploitation attempt by monitoring for multiple 403 errors from the same source IP address within a short time frame, indicating potential access attempts to forbidden admin URLs.
Detection queries are available on the platform. Get full rules →