<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Vvveb &lt; 1.0.8.2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/vvveb--1.0.8.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 19:16:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/vvveb--1.0.8.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>Vvveb CMS XML External Entity Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-vvveb-xxe/</link><pubDate>Wed, 06 May 2026 19:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-vvveb-xxe/</guid><description>Vvveb before 1.0.8.2 is vulnerable to XML external entity (XXE) injection in the admin import feature, allowing authenticated site administrators to read arbitrary files and modify database records, potentially leading to privilege escalation.</description><content:encoded><![CDATA[<p>Vvveb, a content management system, is susceptible to an XML External Entity (XXE) injection vulnerability (CVE-2026-41936) affecting versions prior to 1.0.8.2. The vulnerability resides in the admin Tools/Import functionality, specifically within the <code>system/import/xml.php</code> file. Authenticated users with site_admin privileges can exploit this flaw to inject malicious XML payloads containing file:// or php://filter entity references. This allows attackers to read arbitrary files from the server, including sensitive configuration files and application source code. Furthermore, successful exploitation can lead to the modification of database records, potentially enabling administrator password hash overwriting for privilege escalation, and gaining complete control over the CMS. This vulnerability poses a significant risk to organizations using Vvveb for managing their websites, as it allows unauthorized access to sensitive data and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Vvveb CMS as a site administrator.</li>
<li>The attacker navigates to the admin Tools/Import section.</li>
<li>The attacker crafts a malicious XML file containing an XXE payload with a <code>file://</code> or <code>php://filter</code> wrapper.</li>
<li>The malicious XML payload is uploaded through the import feature.</li>
<li>The Vvveb application parses the XML file using the vulnerable <code>system/import/xml.php</code> script.</li>
<li>The XML parser resolves the external entities, reading arbitrary files from the system.</li>
<li>The application then persists the resolved entities into the application database.</li>
<li>The attacker leverages database modification to overwrite the administrator password hash, gaining elevated privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XXE vulnerability can have severe consequences. An attacker can read sensitive files from the server, potentially exposing confidential data, source code, and API keys. More critically, the ability to modify database records allows for administrator password hash overwriting, leading to complete compromise of the Vvveb CMS. There is no mention of victim count or sector targeting in the source material.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Vvveb to version 1.0.8.2 or later to patch CVE-2026-41936.</li>
<li>Deploy the Sigma rule to detect exploitation attempts against the <code>system/import/xml.php</code> endpoint in Vvveb.</li>
<li>Implement strict input validation and sanitization for XML files uploaded through the admin interface to prevent XXE attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xxe</category><category>vulnerability</category><category>injection</category></item></channel></rss>