Описание
A weakness has been identified in givanz Vvveb up to 1.0.7.2. This vulnerability affects unknown code. Executing manipulation can lead to cross-site request forgery. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. Once again the project maintainer reacted very professional: "I accept the existence of these vulnerabilities. (...) I fixed the code to remove these vulnerabilities and will push the code to github and make a new release."
A weakness has been identified in givanz Vvveb up to 1.0.7.2. This vulnerability affects unknown code. Executing manipulation can lead to cross-site request forgery. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. Once again the project maintainer reacted very professional: "I accept the existence of these vulnerabilities. (...) I fixed the code to remove these vulnerabilities and will push the code to github and make a new release."
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-11029
- https://gist.github.com/KhanMarshaI/165ae8f63ec6b5fdf1f4123252499fce
- https://gist.github.com/KhanMarshaI/db888b65cfd75bead2035348babfb423
- https://vuldb.com/?ctiid.325967
- https://vuldb.com/?id.325967
- https://vuldb.com/?submit.657188
- https://vuldb.com/?submit.657190
- https://vuldb.com/?submit.657191
- https://vuldb.com/?submit.657192
Связанные уязвимости
A weakness has been identified in givanz Vvveb up to 1.0.7.2. This vulnerability affects unknown code. Executing manipulation can lead to cross-site request forgery. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. Once again the project maintainer reacted very professional: "I accept the existence of these vulnerabilities. (...) I fixed the code to remove these vulnerabilities and will push the code to github and make a new release."