A vulnerability was identified in givanz Vvveb up to 1.0.5. This affects an unknown part of the file admin/template/content/edit.tpl. The manipulation of the argument slug leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.6 is able to address this issue. The patch is named 84c11d69df8452dc378feecd17e2a62ac10dac66. It is recommended to upgrade the affected component.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Aug 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Vvveb
Vvveb vvveb |
|
CPEs | cpe:2.3:a:vvveb:vvveb:*:*:*:*:*:*:*:* | |
Vendors & Products |
Vvveb
Vvveb vvveb |
Fri, 15 Aug 2025 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Givanz
Givanz vvveb |
|
Vendors & Products |
Givanz
Givanz vvveb |
Thu, 14 Aug 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was identified in givanz Vvveb up to 1.0.5. This affects an unknown part of the file admin/template/content/edit.tpl. The manipulation of the argument slug leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.6 is able to address this issue. The patch is named 84c11d69df8452dc378feecd17e2a62ac10dac66. It is recommended to upgrade the affected component. | |
Title | givanz Vvveb edit.tpl cross site scripting | |
Weaknesses | CWE-79 CWE-94 |
|
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-08-14T18:32:06.942Z
Updated: 2025-08-14T20:11:40.330Z
Reserved: 2025-08-13T16:34:00.201Z
Link: CVE-2025-8975

No data.

Status : Analyzed
Published: 2025-08-14T19:15:45.057
Modified: 2025-08-18T15:02:44.310
Link: CVE-2025-8975

No data.