CVE-2026-45800: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in givanz Vvveb
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, there is an authenticated SQL injection issue in the frontend user order history page in Vvveb CMS. A normal frontend user can log in and access /user/orders. The order_by and direction request parameters are accepted from the URL, propagated through the Orders component, and directly concatenated into the SQL ORDER BY clause in OrderSQL::getAll(). Because of this, attacker-controlled input reaches SQL structure without a whitelist or safe query construction step. This vulnerability is fixed in 1.0.8.3.
AI Analysis
Technical Summary
CVE-2026-45800 is an authenticated SQL injection vulnerability in Vvveb CMS before version 1.0.8.3. The vulnerability exists in the frontend user order history page (/user/orders) where the 'order_by' and 'direction' URL parameters are passed directly into the SQL ORDER BY clause in OrderSQL::getAll() without validation or safe query construction. This improper neutralization of special elements (CWE-89) allows attackers with valid frontend user credentials to inject SQL commands, potentially compromising database integrity or confidentiality. The issue is resolved in Vvveb version 1.0.8.3.
Potential Impact
An authenticated user can exploit this vulnerability to perform SQL injection attacks on the database through the order history page. This could lead to unauthorized data disclosure, data modification, or other impacts depending on the database privileges and query context. The CVSS 4.0 score of 8.7 reflects a high severity with network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability.
Mitigation Recommendations
Upgrade Vvveb CMS to version 1.0.8.3 or later, where this SQL injection vulnerability is fixed. Since no official patch link or advisory is provided, verify the upgrade from the vendor's official release notes or repository. Until upgraded, restrict access to the affected functionality or implement strict input validation and parameter whitelisting on 'order_by' and 'direction' parameters if possible.
CVE-2026-45800: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in givanz Vvveb
Description
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, there is an authenticated SQL injection issue in the frontend user order history page in Vvveb CMS. A normal frontend user can log in and access /user/orders. The order_by and direction request parameters are accepted from the URL, propagated through the Orders component, and directly concatenated into the SQL ORDER BY clause in OrderSQL::getAll(). Because of this, attacker-controlled input reaches SQL structure without a whitelist or safe query construction step. This vulnerability is fixed in 1.0.8.3.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-45800 is an authenticated SQL injection vulnerability in Vvveb CMS before version 1.0.8.3. The vulnerability exists in the frontend user order history page (/user/orders) where the 'order_by' and 'direction' URL parameters are passed directly into the SQL ORDER BY clause in OrderSQL::getAll() without validation or safe query construction. This improper neutralization of special elements (CWE-89) allows attackers with valid frontend user credentials to inject SQL commands, potentially compromising database integrity or confidentiality. The issue is resolved in Vvveb version 1.0.8.3.
Potential Impact
An authenticated user can exploit this vulnerability to perform SQL injection attacks on the database through the order history page. This could lead to unauthorized data disclosure, data modification, or other impacts depending on the database privileges and query context. The CVSS 4.0 score of 8.7 reflects a high severity with network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability.
Mitigation Recommendations
Upgrade Vvveb CMS to version 1.0.8.3 or later, where this SQL injection vulnerability is fixed. Since no official patch link or advisory is provided, verify the upgrade from the vendor's official release notes or repository. Until upgraded, restrict access to the affected functionality or implement strict input validation and parameter whitelisting on 'order_by' and 'direction' parameters if possible.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-05-13T08:19:32.603Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a076ec4ec166c07b0830a9e
Added to database: 5/15/2026, 7:06:44 PM
Last enriched: 5/15/2026, 7:22:17 PM
Last updated: 5/16/2026, 7:36:09 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.