Vvveb CMS CVE-2026-44826 Allows Negative Order Totals, Exposing Merchants to Financial Fraud

Vvveb CMS CVE-2026-44826 Allows Negative Order Totals, Exposing Merchants to Financial Fraud

The National Vulnerability Database has disclosed CVE-2026-44826, a critical vulnerability in Vvveb CMS versions prior to 1.0.8.2. This flaw allows an unauthenticated attacker to manipulate the quantity parameter on the cart-add endpoint by submitting a negative integer. Instead of rejecting the input, Vvveb CMS processes it, carrying the negative sign through all downstream calculations, including line totals, subtotals, taxes, and the grand total.

The immediate impact is that the customer-facing cart displays a negative grand total, and the checkout process accepts this fraudulent order. Crucially, the order is then persisted in the merchant’s database with a negative total, effectively creating a record where the merchant owes the customer money. This isn’t just a display bug; it’s a direct financial risk, creating illegitimate transactions that can be exploited for fraud or financial manipulation against the merchant. The vulnerability is rated 7.5 (HIGH) on the CVSS scale.

Attackers can leverage this to generate refunds without returning goods, or to create a complex web of fake transactions that complicate financial reconciliation and potentially enable money laundering. This isn’t theoretical; it’s a fundamental breakdown in transaction integrity. Defenders running Vvveb CMS must prioritize patching to version 1.0.8.2 immediately to prevent exploitation and safeguard their financial operations.

What This Means For You

  • If your organization uses Vvveb CMS, you are exposed to direct financial fraud via CVE-2026-44826. Check your Vvveb CMS version immediately. If it's prior to 1.0.8.2, patch to the latest version without delay. Audit your order databases for any suspicious negative-total orders from the past year – these are clear indicators of potential exploitation or attempted fraud.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

Vvveb CMS CVE-2026-44826 Negative Quantity Cart Add - Initial Access

Sigma YAML — free preview
title: Vvveb CMS CVE-2026-44826 Negative Quantity Cart Add - Initial Access
id: scw-2026-05-15-ai-1
status: experimental
level: critical
description: |
  Detects the specific cart-add endpoint in Vvveb CMS being accessed with a negative quantity parameter, which is the core of CVE-2026-44826. This indicates an attempt to exploit the vulnerability for financial fraud.
author: SCW Feed Engine (AI-generated)
date: 2026-05-15
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-44826/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/cart-add'
      cs-uri-query|contains:
          - 'quantity=-'
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-44826 Logic Error Vvveb CMS versions prior to 1.0.8.2
CVE-2026-44826 Logic Error Vvveb CMS endpoint: cart-add
CVE-2026-44826 Logic Error Vvveb CMS parameter: quantity (negative integer input)
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 15, 2026 at 22:17 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-45675: Open WebUI Vulnerable to Admin Role Race Condition

CVE-2026-45675 — Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, he LDAP and OAuth authentication flows use...

vulnerabilityCVEhigh-severitycwe-269cwe-362
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 3 IOCs /⚙ 2 Sigma

CVE-2026-45671: Open WebUI File Deletion Flaw Impacts Self-Hosted AI

CVE-2026-45671 — Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files...

vulnerabilityCVEhigh-severitycwe-639
/SCW Vulnerability Desk /HIGH /8 /⚑ 4 IOCs /⚙ 3 Sigma

Open WebUI CVE-2026-45399: Low-Privilege Users Disrupt System-Wide AI Tasks

CVE-2026-45399 — Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user with low privileges can...

vulnerabilityCVEhigh-severitycwe-862
/SCW Vulnerability Desk /HIGH /7.1 /⚑ 4 IOCs /⚙ 2 Sigma