<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Vvveb &lt; 1.0.8.3 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/vvveb--1.0.8.3/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 15:17:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/vvveb--1.0.8.3/feed.xml" rel="self" type="application/rss+xml"/><item><title>Vvveb Unrestricted File Upload Vulnerability (CVE-2026-41937)</title><link>https://feed.craftedsignal.io/briefs/2026-05-vvveb-file-upload/</link><pubDate>Thu, 14 May 2026 15:17:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-vvveb-file-upload/</guid><description>Vvveb before 1.0.8.3 is vulnerable to unrestricted file upload, allowing super_admin users to execute arbitrary PHP code by uploading a malicious plugin ZIP file containing PHP code which is then accessible via HTTP requests.</description><content:encoded><![CDATA[<p>Vvveb is vulnerable to an unrestricted file upload vulnerability (CVE-2026-41937) affecting versions prior to 1.0.8.3. The vulnerability exists in the plugin upload endpoint, allowing super_admin users to upload arbitrary files. An attacker can exploit this by crafting a malicious plugin ZIP file containing a <code>plugin.php</code> file with a valid <code>Slug</code> header, alongside a <code>public/index.php</code> file containing arbitrary PHP code. Upon uploading this malicious plugin, the PHP code within <code>public/index.php</code> becomes accessible via unauthenticated HTTP requests to the plugin&rsquo;s public path, resulting in remote code execution (RCE) as the web server user.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Vvveb instance running a version prior to 1.0.8.3.</li>
<li>The attacker authenticates as a <code>super_admin</code> user.</li>
<li>The attacker crafts a malicious ZIP archive containing two files: <code>plugin.php</code> and <code>public/index.php</code>.</li>
<li>The <code>plugin.php</code> file includes a valid <code>Slug</code> header to bypass initial checks.</li>
<li>The <code>public/index.php</code> file contains arbitrary PHP code intended for execution.</li>
<li>The attacker uploads the crafted ZIP file through the plugin upload endpoint.</li>
<li>The Vvveb application extracts the ZIP file, placing the <code>public/index.php</code> in a publicly accessible directory.</li>
<li>The attacker sends an unauthenticated HTTP request to the <code>public/index.php</code> file&rsquo;s URL, triggering the execution of the embedded PHP code on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to arbitrary PHP code execution on the Vvveb server. This allows an attacker with <code>super_admin</code> privileges to gain complete control of the affected Vvveb instance, potentially leading to data breaches, defacement, or further lateral movement within the network. Due to the unrestricted nature of the file upload, attackers can deploy backdoors, execute system commands, and compromise the confidentiality, integrity, and availability of the application and underlying system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Vvveb to version 1.0.8.3 or later to patch CVE-2026-41937.</li>
<li>Implement the Sigma rule &ldquo;Detect CVE-2026-41937 Exploitation Attempt — Vvveb Plugin Upload&rdquo; to detect malicious plugin uploads based on HTTP request characteristics.</li>
<li>Restrict access to the plugin upload endpoint to authorized personnel only.</li>
<li>Monitor web server logs for suspicious activity, particularly requests to newly uploaded PHP files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>file upload</category><category>remote code execution</category><category>web application</category></item><item><title>Vvveb Uncontrolled Recursion Denial of Service (CVE-2026-41935)</title><link>https://feed.craftedsignal.io/briefs/2026-05-vvveb-recursion-dos/</link><pubDate>Thu, 14 May 2026 15:17:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-vvveb-recursion-dos/</guid><description>Vvveb before version 1.0.8.3 is vulnerable to an uncontrolled recursion vulnerability in the admin controller dispatch cycle that allows a low-privilege attacker to cause denial of service by exhausting PHP memory.</description><content:encoded><![CDATA[<p>Vvveb is susceptible to an uncontrolled recursion vulnerability (CVE-2026-41935) affecting versions prior to 1.0.8.3. The vulnerability lies within the admin controller dispatch cycle, specifically how <code>Base::init()</code> repeatedly invokes <code>permission()</code> on error handlers. This recursion occurs when a low-privilege account attempts to access forbidden admin URLs. By sending sustained requests, an attacker can exhaust the PHP memory on all workers, leading to a denial-of-service condition that impacts legitimate traffic. This vulnerability poses a significant risk to web applications using Vvveb, as even a low-privilege account can trigger a widespread outage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains a low-privilege account on the Vvveb application.</li>
<li>Attacker identifies forbidden admin URLs (e.g., <code>/admin/config</code>).</li>
<li>Attacker crafts HTTP requests targeting these forbidden admin URLs.</li>
<li>The requests are sent to the Vvveb server.</li>
<li>The server&rsquo;s admin controller dispatch cycle initiates.</li>
<li>Due to insufficient permissions, <code>Base::init()</code> invokes <code>permission()</code> on error handlers.</li>
<li>The error handler triggers a recursive call back to <code>permission()</code>, repeating infinitely.</li>
<li>This uncontrolled recursion exhausts PHP memory limits on all workers, causing a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition affecting all users of the Vvveb application. While the vulnerability requires a low-privilege account, the resulting impact can be severe, potentially disrupting critical services and causing financial losses. The CVSS v3.1 base score is 7.1, indicating a high risk of exploitation and potential damage. The number of affected victims depends on the popularity and deployment size of the Vvveb instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Vvveb to version 1.0.8.3 or later to patch CVE-2026-41935; reference the advisory in the references section.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-41935 Exploitation Attempt - Multiple 403 Errors&rdquo; to identify potential exploitation attempts by monitoring web server logs for frequent 403 errors.</li>
<li>Monitor web server resource consumption (CPU, memory) for unexpected spikes, which could indicate a denial-of-service attack stemming from the uncontrolled recursion.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial of service</category><category>web application</category><category>recursion</category></item></channel></rss>