CVE-2025-8518
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-04

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in givanz Vvveb 1.0.5. It has been rated as critical. Affected by this issue is the function Save of the file admin/controller/editor/code.php of the component Code Editor. The manipulation leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.6 is able to address this issue. The name of the patch is f684f3e374d04db715730fc4796e102f5ebcacb2. It is recommended to upgrade the affected component.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-04
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-08-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
vvveb vvveb 1.0.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-8518 is a critical code injection vulnerability in givanz Vvveb version 1.0.5, specifically in the save function of the Code Editor component. It occurs because the application improperly handles input when saving code, allowing an authenticated admin user to inject malicious PHP code remotely. This can be exploited by editing PHP files like theme.php through the admin interface, replacing their content with a malicious reverse shell script, which then executes on the server. The vulnerability arises from lack of validation on plugin code modifications, enabling remote code execution (RCE) under the webserver user. [1, 3, 4]


How can this vulnerability impact me? :

This vulnerability can lead to remote code execution on the affected server, allowing an attacker with admin access to execute arbitrary code, gain shell access, and potentially take full control of the webserver. This compromises the confidentiality, integrity, and availability of the system. Attackers can deploy reverse shells to run commands, escalate privileges, and move laterally within the network. The vulnerability is particularly dangerous when combined with other attack vectors like password brute forcing or cross-site scripting, which can lead to full system compromise. [1, 3, 4, 5]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by identifying the presence of the vulnerable endpoint `admin/controller/editor/code.php` in givanz Vvveb version 1.0.5. One method is to use Google dorking with the query `inurl:admin/controller/editor/code.php` to find exposed instances. On your system or network, you can check for the existence of this file path in the web application directory. Additionally, monitoring HTTP requests to the endpoint `/vadmin123/index.php?module=editor/code&type=themes` for suspicious activity such as attempts to edit `theme.php` with unusual payloads (e.g., PHP shell code) can help detect exploitation attempts. For detection of active exploitation, you can use network monitoring tools to look for reverse shell connections typically initiated by netcat (e.g., `nc -lnvp <port>`). Specific commands include: 1) Searching for the vulnerable file: `find /var/www/html -path '*admin/controller/editor/code.php'` 2) Monitoring web server logs for POST requests to `/vadmin123/index.php?module=editor/code&type=themes` 3) Using netstat or ss to detect suspicious outbound connections: `netstat -tnp | grep ESTABLISHED` or `ss -tnp | grep ESTABLISHED` 4) Using Google dork: `site:yourdomain.com inurl:admin/controller/editor/code.php` to find exposed endpoints externally. [1, 3, 4]


What immediate steps should I take to mitigate this vulnerability?

The immediate and recommended mitigation step is to upgrade givanz Vvveb from version 1.0.5 to version 1.0.6, which includes a patch that prevents saving files with `.php` and `.tpl` extensions through the code editor, thereby blocking the code injection vector. This patch is identified by commit `f684f3e374d04db715730fc4796e102f5ebcacb2`. Additionally, version 1.0.6 introduces brute force protection for admin and user login pages and other security enhancements such as escaping menu items to prevent XSS. If upgrading immediately is not possible, restrict access to the vulnerable endpoints, enforce strict authentication and authorization controls, and monitor for suspicious activity. Applying network-level controls to block outbound connections that could be used for reverse shells is also advised. [1, 2, 6]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart