A security vulnerability has been detected in givanz Vvveb 1.0.7.2. This affects an unknown part of the file app/template/user/login.tpl. Such manipulation of the argument Email/Password leads to cross site scripting. The attack can be executed remotely. The name of the patch is bbd4c42c66ab818142240348173a669d1d2537fe. Applying a patch is advised to resolve this issue.
https://vuldb.com/?submit.639704
https://vuldb.com/?ctiid.322017
https://github.com/kwerty138/Reflected-XSS-in-Vvveb-CMS-v1.0.7.2
https://github.com/givanz/Vvveb/issues/323
https://github.com/givanz/Vvveb/commit/bbd4c42c66ab818142240348173a669d1d2537fe
Published: 2025-08-31
Updated: 2025-09-02
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
Severity: Medium
Base Score: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Severity: Medium
Base Score: 5.3
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.00036