๐Ÿ” CVE Alert

CVE-2026-45800

UNKNOWN 0.0

Vvveb: Authenticated SQL injection in /user/orders via order_by and direction

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, there is an authenticated SQL injection issue in the frontend user order history page in Vvveb CMS. A normal frontend user can log in and access /user/orders. The order_by and direction request parameters are accepted from the URL, propagated through the Orders component, and directly concatenated into the SQL ORDER BY clause in OrderSQL::getAll(). Because of this, attacker-controlled input reaches SQL structure without a whitelist or safe query construction step. This vulnerability is fixed in 1.0.8.3.

CWE CWE-89
Vendor givanz
Product vvveb
Published May 15, 2026
Stay Ahead of the Next One

Get instant alerts for givanz vvveb

Be the first to know when new unknown vulnerabilities affecting givanz vvveb are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

givanz / Vvveb
< 1.0.8.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/givanz/Vvveb/security/advisories/GHSA-vwcx-w4fq-9769