Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-39918 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Vvveb CMS has a critical flaw in its installation endpoint. The `subdir` parameter is written to config files without validation. πŸ’₯ **Consequences**: This allows **Remote Code Execution (RCE)**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-94** (Code Injection). The developer failed to sanitize the `subdir` input during installation. This unvalidated data is directly written into configuration files, enabling code injection. πŸ“

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Users of **Vvveb CMS** by givanz. Specifically, versions **prior to 1.0.8.1**. If you are running an older build, you are vulnerable. πŸ“¦

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Full **Remote Code Execution**. With CVSS 10.0 (Critical), hackers gain High Confidentiality, Integrity, and Availability impact. They can execute arbitrary commands on the host. πŸ”“

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **LOW**. The vector is Network (AV:N), Attack Complexity is Low (AC:L), and no Privileges (PR:N) or User Interaction (UI:N) are required. It is an open door for anyone. πŸšͺ

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ•΅οΈ **Public Exploit**: The provided data lists **no specific PoC** (`pocs: []`). However, the vulnerability is well-documented in third-party advisories. Wild exploitation is likely given the low barrier to entry. ⚠️

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for Vvveb CMS instances. Check the version number in the footer or source code. If it is **< 1.0.8.1**, you are at risk. Look for the `/install` endpoint being accessible. 🧐

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **YES**. The vendor (givanz) released patch **1.0.8.1**. The fix is available via GitHub releases and commits. Update immediately to the latest version. πŸ”„

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: If you cannot update, **disable the installation endpoint** entirely. Restrict access to the `/install` path via WAF or web server config. Remove the installer if not needed. πŸ›‘

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. CVSS 10.0 score means this is a top-priority fix. RCE via network without auth is a server-killer. Patch now to prevent compromise. ⏳