๐Ÿ” CVE Alert

CVE-2026-41932

MEDIUM 6.1

Vvveb < 1.0.8.3 Stored XSS via Signup Controller

CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
0th

Vvveb before 1.0.8.3 contains a stored cross-site scripting vulnerability in the customer signup flow where the Signup::addUser() controller copies raw POST username values into the display_name field before sanitization occurs. Attackers can submit HTML and script markup in the username field during signup, which gets stripped from the username column but persisted verbatim in the display_name column, allowing stored XSS execution when display_name is rendered without encoding in vulnerable views.

CWE CWE-79
Vendor givanz
Product vvveb
Published May 14, 2026
Last Updated May 14, 2026
Stay Ahead of the Next One

Get instant alerts for givanz vvveb

Be the first to know when new medium vulnerabilities affecting givanz vvveb are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

givanz / Vvveb
0 < 1.0.8.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/givanz/Vvveb/releases/tag/1.0.8.3 github.com: https://github.com/givanz/Vvveb/commit/fefac290a8c85d3c87fe80ffed68b6c5bc50e93c vulncheck.com: https://www.vulncheck.com/advisories/vvveb-stored-xss-via-signup-controller

Credits

Basant Kumar (@CyberWarrior9) VulnCheck