CVE-2026-41929 PUBLISHED

Vvveb < 1.0.8.2 Unauthenticated Reflected XSS via Visual Editor

Assigner: VulnCheck
Reserved: 22.04.2026 Published: 07.05.2026 Updated: 07.05.2026

Vvveb before 1.0.8.2 contains an unauthenticated reflected cross-site scripting vulnerability in the visual editor preview renderer that allows attackers to execute arbitrary JavaScript by manipulating the r query parameter and _component_ajax POST parameter. Attackers can craft a malicious link or auto-submitted form that causes victims to execute attacker-controlled JavaScript in the context of the Vvveb origin, as the gating function isEditor() performs no session, role, or token verification and the view handler injects raw HTML POST body content without sanitization.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
CVSS Score: 5.1

Product Status

Vendor givanz
Product Vvveb
Versions Default: affected
  • affected from 0 to 1.0.8.2 (excl.)

Credits

  • Basant Kumar (@CyberWarrior9) finder
  • Hamed Kohi (@0xHamy) finder
  • VulnCheck finder

References

Problem Types

  • Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE