๐Ÿ” CVE Alert

CVE-2026-6257

CRITICAL 9.1

Vvveb CMS v1.0.8 Remote Code Execution via Media Management

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

Vvveb CMS v1.0.8 contains a remote code execution vulnerability in its media management functionality where a missing return statement in the file rename handler allows authenticated attackers to rename files to blocked extensions .php or .htaccess. Attackers can exploit this logic flaw by first uploading a text file and renaming it to .htaccess to inject Apache directives that register PHP-executable MIME types, then uploading another file and renaming it to .php to execute arbitrary operating system commands as the www-data user.

CWE CWE-434
Vendor vvveb
Product vvveb cms
Published Apr 20, 2026
Stay Ahead of the Next One

Get instant alerts for vvveb vvveb cms

Be the first to know when new critical vulnerabilities affecting vvveb vvveb cms are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Vvveb / Vvveb CMS
1.0.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/givanz/Vvveb/commit/6fb8eaa998265e33e8802cbc220d8859dbc144f2 vulncheck.com: https://www.vulncheck.com/advisories/vvveb-cms-remote-code-execution-via-media-management

Credits

Mohammed EL OUARDANI