CVE-2025-12203

6.3 MEDIUM

📋 TL;DR

This CVE describes a path traversal vulnerability in givanz Vvveb CMS up to version 1.0.7.3. Attackers can manipulate file paths through the Code Editor component to access arbitrary files on the server. This affects all installations using vulnerable versions of Vvveb CMS.

💻 Affected Systems

Products:
  • givanz Vvveb CMS
Versions: up to 1.0.7.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Code Editor component access, which may require authentication depending on configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attackers could read sensitive files like configuration files, source code, or system files, potentially leading to credential theft, code disclosure, or further server compromise.

🟠

Likely Case

Attackers would access application files, configuration files, or other web-accessible content, potentially obtaining database credentials or other sensitive information.

🟢

If Mitigated

With proper file permissions and web server restrictions, impact would be limited to files accessible by the web server user.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

The exploit has been made public according to the description. Attack requires access to the Code Editor functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: After commit b0fa7ff74a3539c6d37000db152caad572e4c39b

Vendor Advisory: https://github.com/givanz/Vvveb/issues/333

Restart Required: No

Instructions:

1. Update to latest Vvveb version. 2. Apply commit b0fa7ff74a3539c6d37000db152caad572e4c39b. 3. Verify the fix in system/functions.php sanitizeFileName function.

🔧 Temporary Workarounds

Disable Code Editor

all

Temporarily disable the Code Editor component to prevent exploitation.

Restrict File Access

all

Configure web server to restrict file access outside web root.

🧯 If You Can't Patch

  • Implement strict input validation for file parameters
  • Apply web application firewall rules to block path traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check if Vvveb version is 1.0.7.3 or earlier and Code Editor is enabled.

Check Version:

Check Vvveb version in admin panel or version file.

Verify Fix Applied:

Verify that commit b0fa7ff74a3539c6d37000db152caad572e4c39b is applied in system/functions.php.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs
  • Requests containing '../' or similar path traversal sequences

Network Indicators:

  • HTTP requests with file parameter containing path traversal sequences

SIEM Query:

web.url:*../* AND (web.method:POST OR web.method:GET) AND destination.port:80 OR destination.port:443

🔗 References

📤 Share & Export