<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Vvveb — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/vvveb/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 19:16:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/vvveb/feed.xml" rel="self" type="application/rss+xml"/><item><title>Vvveb Hardcoded Credentials Vulnerability in phpMyAdmin Container</title><link>https://feed.craftedsignal.io/briefs/2026-05-vvveb-hardcoded-credentials/</link><pubDate>Wed, 06 May 2026 19:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-vvveb-hardcoded-credentials/</guid><description>Vvveb versions before 1.0.8.2 contain a hardcoded credentials vulnerability in the docker-compose-apache.yaml configuration, allowing unauthenticated attackers to access the phpMyAdmin container and gain unrestricted read and write access to the Vvveb database, leading to account takeover and data manipulation.</description><content:encoded><![CDATA[<p>Vvveb, a web page builder, versions before 1.0.8.2 are susceptible to a critical vulnerability stemming from hardcoded credentials within the <code>docker-compose-apache.yaml</code> file. This misconfiguration exposes the bundled phpMyAdmin container, providing unauthenticated attackers with a readily available pathway to compromise the entire Vvveb database. By exploiting these default credentials, attackers circumvent normal authentication procedures and gain complete control over sensitive data. This includes administrator password hashes, customer Personally Identifiable Information (PII), and order details. The ease of exploitation and the potential for significant data breach make this vulnerability a critical risk for any organization using affected versions of Vvveb.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Vvveb instance running a version prior to 1.0.8.2.</li>
<li>Attacker accesses the phpMyAdmin service exposed by the vulnerable Vvveb instance, typically on port 80 or 443 depending on the configuration.</li>
<li>Attacker uses the hardcoded credentials found in the <code>docker-compose-apache.yaml</code> file to authenticate to the phpMyAdmin interface without needing to bypass any security measures.</li>
<li>Upon successful authentication, the attacker gains unrestricted read and write access to the entire Vvveb database through the phpMyAdmin interface.</li>
<li>Attacker extracts sensitive information, including administrator password hashes, customer PII, and order data.</li>
<li>Attacker uses the compromised administrator password hashes to gain administrative access to the Vvveb application.</li>
<li>Attacker manipulates database records to modify user accounts, alter orders, or inject malicious code into the website.</li>
<li>Attacker achieves full account takeover and data manipulation capabilities, potentially leading to significant financial loss and reputational damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to compromise the entire Vvveb database. This grants access to sensitive customer data, including PII and financial information, as well as administrator credentials. Consequences include account takeover, data theft, and manipulation of website content. Given the widespread use of phpMyAdmin and the ease of exploitation, organizations running vulnerable versions of Vvveb are at significant risk of data breaches and financial losses. The CVSS v3.1 base score of 9.8 highlights the critical nature of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Vvveb to version 1.0.8.2 or later to patch CVE-2026-41930.</li>
<li>If upgrading is not immediately feasible, restrict access to the phpMyAdmin container by modifying firewall rules to only allow access from trusted IP addresses or internal networks.</li>
<li>Deploy the Sigma rule to detect unauthorized access attempts to the phpMyAdmin interface via specific HTTP requests targeting phpMyAdmin login pages.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>hardcoded-credentials</category><category>phpmyadmin</category><category>docker</category><category>vulnerability</category></item><item><title>Vvveb CMS XML External Entity Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-vvveb-xxe/</link><pubDate>Wed, 06 May 2026 19:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-vvveb-xxe/</guid><description>Vvveb before 1.0.8.2 is vulnerable to XML external entity (XXE) injection in the admin import feature, allowing authenticated site administrators to read arbitrary files and modify database records, potentially leading to privilege escalation.</description><content:encoded><![CDATA[<p>Vvveb, a content management system, is susceptible to an XML External Entity (XXE) injection vulnerability (CVE-2026-41936) affecting versions prior to 1.0.8.2. The vulnerability resides in the admin Tools/Import functionality, specifically within the <code>system/import/xml.php</code> file. Authenticated users with site_admin privileges can exploit this flaw to inject malicious XML payloads containing file:// or php://filter entity references. This allows attackers to read arbitrary files from the server, including sensitive configuration files and application source code. Furthermore, successful exploitation can lead to the modification of database records, potentially enabling administrator password hash overwriting for privilege escalation, and gaining complete control over the CMS. This vulnerability poses a significant risk to organizations using Vvveb for managing their websites, as it allows unauthorized access to sensitive data and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Vvveb CMS as a site administrator.</li>
<li>The attacker navigates to the admin Tools/Import section.</li>
<li>The attacker crafts a malicious XML file containing an XXE payload with a <code>file://</code> or <code>php://filter</code> wrapper.</li>
<li>The malicious XML payload is uploaded through the import feature.</li>
<li>The Vvveb application parses the XML file using the vulnerable <code>system/import/xml.php</code> script.</li>
<li>The XML parser resolves the external entities, reading arbitrary files from the system.</li>
<li>The application then persists the resolved entities into the application database.</li>
<li>The attacker leverages database modification to overwrite the administrator password hash, gaining elevated privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XXE vulnerability can have severe consequences. An attacker can read sensitive files from the server, potentially exposing confidential data, source code, and API keys. More critically, the ability to modify database records allows for administrator password hash overwriting, leading to complete compromise of the Vvveb CMS. There is no mention of victim count or sector targeting in the source material.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Vvveb to version 1.0.8.2 or later to patch CVE-2026-41936.</li>
<li>Deploy the Sigma rule to detect exploitation attempts against the <code>system/import/xml.php</code> endpoint in Vvveb.</li>
<li>Implement strict input validation and sanitization for XML files uploaded through the admin interface to prevent XXE attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xxe</category><category>vulnerability</category><category>injection</category></item><item><title>Vvveb Authenticated Remote Code Execution via .htaccess Upload (CVE-2026-41934)</title><link>https://feed.craftedsignal.io/briefs/2024-01-vvveb-rce/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-vvveb-rce/</guid><description>Vvveb versions before 1.0.8.2 are vulnerable to authenticated remote code execution (RCE), enabling low-privilege users to execute arbitrary code by uploading a malicious .htaccess file and subsequently uploading PHP code with a mapped extension, resulting in unauthenticated RCE upon file access.</description><content:encoded><![CDATA[<p>Vvveb versions prior to 1.0.8.2 are susceptible to an authenticated remote code execution vulnerability, identified as CVE-2026-41934. This flaw allows attackers with low-privilege accounts (editor, author, contributor, or site_admin) to execute arbitrary code on the server. The vulnerability stems from insufficient file extension restrictions in the admin code editor. An attacker can leverage this weakness to upload a specially crafted .htaccess file, which maps arbitrary file extensions to the PHP handler. Subsequently, they can upload a PHP file with the newly mapped extension. When this PHP file is accessed via HTTP, the server executes the embedded code, resulting in unauthenticated remote code execution. This poses a significant threat, as it enables attackers to compromise the entire web server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to the Vvveb application with editor, author, contributor, or site_admin privileges.</li>
<li>The attacker navigates to the admin code editor within the Vvveb application.</li>
<li>The attacker crafts a malicious .htaccess file that maps an arbitrary file extension (e.g., .test) to the PHP handler. The .htaccess file contains the line: <code>AddType application/x-httpd-php .test</code></li>
<li>The attacker uses the admin code editor to upload the malicious .htaccess file to a publicly accessible directory on the web server.</li>
<li>The attacker crafts a PHP file containing malicious code and saves it with the file extension mapped in the .htaccess file (e.g., shell.test).</li>
<li>The attacker uploads the PHP file (shell.test) to the same directory as the .htaccess file using the admin code editor.</li>
<li>The attacker sends an HTTP request to the uploaded PHP file (e.g., <code>http://example.com/path/to/shell.test</code>).</li>
<li>The web server, due to the .htaccess configuration, interprets the .test file as PHP and executes the malicious code, achieving remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41934 allows an attacker to execute arbitrary code on the web server hosting Vvveb. This can lead to complete system compromise, data theft, defacement of the website, or further lateral movement within the network. The vulnerability affects all Vvveb instances running versions prior to 1.0.8.2. Due to the ease of exploitation, a wide range of Vvveb installations are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Vvveb to version 1.0.8.2 or later to patch CVE-2026-41934 immediately.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious .htaccess Uploads&rdquo; to detect attempts to upload malicious .htaccess files via the webserver logs.</li>
<li>Monitor web server access logs for requests to files with unusual extensions (e.g., .test, .custom) after the upload of .htaccess files to identify potential exploitation attempts.</li>
<li>Implement the Sigma rule &ldquo;Detect Web Request for unusual file extensions&rdquo; to detect requests to files with unusual file extensions.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>htaccess</category><category>vvveb</category><category>CVE-2026-41934</category><category>attack.execution</category></item></channel></rss>