CVE-2026-45800
Vvveb: Authenticated SQL injection in /user/orders via order_by and direction
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, there is an authenticated SQL injection issue in the frontend user order history page in Vvveb CMS. A normal frontend user can log in and access /user/orders. The order_by and direction request parameters are accepted from the URL, propagated through the Orders component, and directly concatenated into the SQL ORDER BY clause in OrderSQL::getAll(). Because of this, attacker-controlled input reaches SQL structure without a whitelist or safe query construction step. This vulnerability is fixed in 1.0.8.3.
| CWE | CWE-89 |
| Vendor | givanz |
| Product | vvveb |
| Published | May 15, 2026 |
Get instant alerts for givanz vvveb
Be the first to know when new unknown vulnerabilities affecting givanz vvveb are published โ delivered to Slack, Telegram or Discord.