CVE-2025-11026
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-26

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was determined in givanz Vvveb up to 1.0.7.2. Affected by this vulnerability is an unknown functionality of the component Configuration File Handler. This manipulation causes information disclosure. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Once again the project maintainer reacted very professional: "I accept the existence of these vulnerabilities. (...) I fixed the code to remove these vulnerabilities and will push the code to github and make a new release."
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-26
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-09-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
vvveb vvveb to 1.0.7.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CWE-NVD-CWE-noinfo
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in givanz Vvveb up to version 1.0.7.2 affects an unknown functionality of the Configuration File Handler component. It allows an attacker to manipulate the component to cause information disclosure. The attack can be initiated remotely, and the exploit has been publicly disclosed. The project maintainer has acknowledged the vulnerability and fixed the code to remove it.


How can this vulnerability impact me? :

The vulnerability can lead to information disclosure, meaning sensitive or confidential information handled by the Configuration File Handler component could be exposed to unauthorized parties. Since the attack can be performed remotely, it increases the risk of unauthorized access to information.


What immediate steps should I take to mitigate this vulnerability?

The project maintainer has fixed the code to remove these vulnerabilities and will push the code to GitHub and make a new release. Immediate steps include updating to the fixed version once it is released to mitigate the vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart