A weakness has been identified in givanz Vvveb up to 1.0.7.2. Affected is an unknown function of the file /system/traits/media.php. Executing manipulation of the argument files[] can lead to unrestricted upload. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. Applying a patch is advised to resolve this issue. The code maintainer explains, that "[he] fixed the code to remove this vulnerability and will make a new release".
References
Link | Resource |
---|---|
https://github.com/August829/Yu/blob/main/20250812_2.md | Exploit |
https://github.com/August829/Yu/blob/main/20250812_2.md#poc | Exploit |
https://vuldb.com/?ctiid.321233 | Permissions Required VDB Entry |
https://vuldb.com/?id.321233 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.632530 | Third Party Advisory VDB Entry |
Configurations
History
27 Aug 2025, 19:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vvveb:vvveb:*:*:*:*:*:*:*:* | |
First Time |
Vvveb
Vvveb vvveb |
|
References | () https://github.com/August829/Yu/blob/main/20250812_2.md - Exploit | |
References | () https://github.com/August829/Yu/blob/main/20250812_2.md#poc - Exploit | |
References | () https://vuldb.com/?ctiid.321233 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.321233 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.632530 - Third Party Advisory, VDB Entry |
25 Aug 2025, 20:24
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Aug 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-24 23:15
Updated : 2025-08-27 19:01
NVD link : CVE-2025-9397
Mitre link : CVE-2025-9397
CVE.ORG link : CVE-2025-9397
JSON object : View
Products Affected
vvveb
- vvveb