Vvveb Prior to 1.0.8.3 Vulnerable to DoS via Uncontrolled Recursion
The National Vulnerability Database reports a critical uncontrolled recursion vulnerability, CVE-2026-41935, affecting Vvveb versions prior to 1.0.8.3. This flaw resides in the admin controller dispatch cycle, where the Base::init() function repeatedly calls permission() on error handlers. This creates an infinite recursion loop, rapidly exhausting PHP memory limits.
Attackers can exploit this with minimal effort. By sending sustained requests to forbidden administrative URLs from a low-privilege account, they can trigger this recursion. The result is a complete denial of service (DoS) for all legitimate traffic, as all PHP workers become incapacitated. The National Vulnerability Database assigns this a CVSS score of 7.1 (High severity), emphasizing the significant impact on availability.
This isn’t just a crash; it’s a resource exhaustion attack that any authenticated, low-privilege user can execute. Defenders need to understand that this isn’t about data exfiltration, but about crippling operations. The attacker’s calculus is simple: maximum disruption with minimal access. Patches are the only solution here, as this is a fundamental architectural flaw in how error handling interacts with permissions.
What This Means For You
- If your organization uses Vvveb, immediately verify your version. If it's prior to 1.0.8.3, patch to the latest version without delay. This vulnerability allows any low-privilege user to take down your entire Vvveb instance, halting critical administrative functions and user access.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Vvveb Uncontrolled Recursion DoS Attempt - CVE-2026-41935
title: Vvveb Uncontrolled Recursion DoS Attempt - CVE-2026-41935
id: scw-2026-05-14-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit CVE-2026-41935 by targeting specific admin URLs within Vvveb. The vulnerability lies in the Base::init() function's uncontrolled recursion when handling errors for forbidden admin URLs, leading to a denial of service by exhausting PHP memory. This rule looks for GET requests to '/admin/' paths that result in a 500 Internal Server Error, indicative of the application crashing due to the recursion.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41935/
tags:
- attack.impact
- attack.t1499
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/admin/'
cs-method:
- 'GET'
sc-status:
- '500'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41935 | DoS | Vvveb < 1.0.8.3 |
| CVE-2026-41935 | DoS | Uncontrolled recursion in admin controller dispatch cycle |
| CVE-2026-41935 | DoS | Base::init() repeatedly invokes permission() on error handlers |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 18:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.