CVE-2026-39918

| EUVD-2026-23868 CRITICAL
2026-04-20 VulnCheck
9.2
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

3
Re-analysis Queued
Apr 20, 2026 - 16:22 vuln.today
cvss_changed
CVSS Changed
Apr 20, 2026 - 16:22 NVD
9.8 (CRITICAL) 9.2 (CRITICAL)
Analysis Generated
Apr 20, 2026 - 15:51 vuln.today

DescriptionNVD

Vvveb prior to 1.0.8.1 contains a code injection vulnerability in the installation endpoint where the subdir POST parameter is written unsanitized into the env.php configuration file without escaping or validation. Attackers can inject arbitrary PHP code by breaking out of the string context in the define statement to achieve unauthenticated remote code execution as the web server user.

AnalysisAI

Remote code execution in Vvveb CMS versions prior to 1.0.8.1 allows unauthenticated attackers to inject arbitrary PHP code through the installation endpoint's subdir parameter, which is written directly into env.php without sanitization. The vulnerability enables complete system compromise as the web server user with no authentication required. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all systems running Vvveb CMS and confirm installed versions; immediately restrict network access to the installation endpoint (/install or equivalent) or take the application offline if patching cannot be completed. Within 7 days: Upgrade all Vvveb CMS instances to version 1.0.8.1 or later. …

Sign in for detailed remediation steps.

Share

CVE-2026-39918 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy