Vulnerability Description
Vvveb before 1.0.8.3 contains a stored cross-site scripting vulnerability in the customer signup flow where the Signup::addUser() controller copies raw POST username values into the display_name field before sanitization occurs. Attackers can submit HTML and script markup in the username field during signup, which gets stripped from the username column but persisted verbatim in the display_name column, allowing stored XSS execution when display_name is rendered without encoding in vulnerable views.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/givanz/Vvveb/commit/fefac290a8c85d3c87fe80ffed68b6c5bc50e93c
- https://github.com/givanz/Vvveb/releases/tag/1.0.8.3
- https://www.vulncheck.com/advisories/vvveb-stored-xss-via-signup-controller
FAQ
What is CVE-2026-41932?
CVE-2026-41932 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Vvveb before 1.0.8.3 contains a stored cross-site scripting vulnerability in the customer signup flow where the Signup::addUser() controller copies raw POST username values into the display_name field...
How severe is CVE-2026-41932?
CVE-2026-41932 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41932?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.