CVE-2025-9728
A security vulnerability has been detected in givanz Vvveb 1.0.7.2. This affects an unknown part of the file app/template/user/login.tpl. Such manipulation of the argument Email/Password leads to cross site scripting. The attack can be executed remotely. The name of the patch is bbd4c42c66ab818142240348173a669d1d2537fe. Applying a patch is advised to resolve this issue.
Vendor
Product
CWE
Yayın Tarihi
2025-08-31 12:15:33
Güncelleme
2025-09-05 20:27:47
Source Identifier
cna@vuldb.com
KEV Date Added
-
Kategoriler
Referanslar
https://github.com/givanz/Vvveb/commit/bbd4c42c66ab818142240348173a669d1d2537fe
https://github.com/givanz/Vvveb/issues/323
https://github.com/kwerty138/Reflected-XSS-in-Vvveb-CMS-v1.0.7.2
https://vuldb.com/?ctiid.322017
https://vuldb.com/?id.322017
https://vuldb.com/?submit.639704
https://github.com/givanz/Vvveb/issues/323
https://github.com/kwerty138/Reflected-XSS-in-Vvveb-CMS-v1.0.7.2