CVE-2025-9728

medium

Description

A security vulnerability has been detected in givanz Vvveb 1.0.7.2. This affects an unknown part of the file app/template/user/login.tpl. Such manipulation of the argument Email/Password leads to cross site scripting. The attack can be executed remotely. The name of the patch is bbd4c42c66ab818142240348173a669d1d2537fe. Applying a patch is advised to resolve this issue.

References

https://vuldb.com/?submit.639704

https://vuldb.com/?id.322017

https://vuldb.com/?ctiid.322017

https://github.com/kwerty138/Reflected-XSS-in-Vvveb-CMS-v1.0.7.2

https://github.com/givanz/Vvveb/issues/323

https://github.com/givanz/Vvveb/commit/bbd4c42c66ab818142240348173a669d1d2537fe

Details

Source: Mitre, NVD

Published: 2025-08-31

Updated: 2025-09-02

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 4.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Severity: Medium

CVSS v4

Base Score: 5.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Severity: Medium

EPSS

EPSS: 0.00036