CVE-2026-41932
Vvveb < 1.0.8.3 Stored XSS via Signup Controller
CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
0th
Vvveb before 1.0.8.3 contains a stored cross-site scripting vulnerability in the customer signup flow where the Signup::addUser() controller copies raw POST username values into the display_name field before sanitization occurs. Attackers can submit HTML and script markup in the username field during signup, which gets stripped from the username column but persisted verbatim in the display_name column, allowing stored XSS execution when display_name is rendered without encoding in vulnerable views.
| CWE | CWE-79 |
| Vendor | givanz |
| Product | vvveb |
| Published | May 14, 2026 |
| Last Updated | May 14, 2026 |
Stay Ahead of the Next One
Get instant alerts for givanz vvveb
Be the first to know when new medium vulnerabilities affecting givanz vvveb are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Affected Versions
givanz / Vvveb
0 < 1.0.8.3
References
Credits
Basant Kumar (@CyberWarrior9) VulnCheck