CVE-2025-11026
BaseFortify
Publication date: 2025-09-26
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| vvveb | vvveb | to 1.0.7.2 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in givanz Vvveb up to version 1.0.7.2 affects an unknown functionality of the Configuration File Handler component. It allows an attacker to manipulate the component to cause information disclosure. The attack can be initiated remotely, and the exploit has been publicly disclosed. The project maintainer has acknowledged the vulnerability and fixed the code to remove it.
How can this vulnerability impact me? :
The vulnerability can lead to information disclosure, meaning sensitive or confidential information handled by the Configuration File Handler component could be exposed to unauthorized parties. Since the attack can be performed remotely, it increases the risk of unauthorized access to information.
What immediate steps should I take to mitigate this vulnerability?
The project maintainer has fixed the code to remove these vulnerabilities and will push the code to GitHub and make a new release. Immediate steps include updating to the fixed version once it is released to mitigate the vulnerability.