PatchSiren cyber security CVE debrief
CVE-2026-45800 givanz CVE debrief
CVE-2026-45800 affects Vvveb CMS prior to 1.0.8.3 and is described as an authenticated SQL injection in the frontend user order history page. A normal frontend user can log in, visit /user/orders, and influence the order_by and direction parameters. Those values are passed through the Orders component and concatenated into the SQL ORDER BY clause in OrderSQL::getAll() without a whitelist or safe query construction step, creating CWE-89 risk. The issue was publicly disclosed on 2026-05-15 and later modified on 2026-05-18.
- Vendor
- givanz
- Product
- Vvveb
- CVSS
- HIGH 8.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-15
- Original CVE updated
- 2026-05-18
- Advisory published
- 2026-05-15
- Advisory updated
- 2026-05-18
Who should care
Administrators and operators running Vvveb CMS installations, especially sites that allow frontend user accounts and order history access, should treat this as a priority patching issue.
Technical summary
The vulnerability is an authenticated SQL injection in the frontend order history workflow. The request parameters order_by and direction are accepted from the URL on /user/orders, propagated through the Orders component, and directly concatenated into the SQL ORDER BY clause in OrderSQL::getAll(). Because the input is used in SQL structure rather than validated against an allowlist, a logged-in frontend user can influence query construction. The advisory states the issue is fixed in Vvveb CMS 1.0.8.3.
Defensive priority
High. The CVSS score is 8.7 (HIGH), and the flaw is reachable by authenticated frontend users. Patch promptly to 1.0.8.3 and review any deployments that expose order history functionality to untrusted users.
Recommended defensive actions
- Upgrade Vvveb CMS to version 1.0.8.3 or later.
- Review any customizations around /user/orders and related order sorting logic for unsafe SQL string concatenation.
- Restrict frontend account access where possible until patching is complete.
- Monitor application logs for unusual requests to order history endpoints using unexpected order_by or direction values.
- Validate that database access used by the application follows least privilege.
Evidence notes
The CVE record and NVD detail identify CVE-2026-45800 as a high-severity issue published on 2026-05-15 and modified on 2026-05-18. The linked GitHub Security Advisory describes an authenticated SQL injection in Vvveb CMS prior to 1.0.8.3, assigns CWE-89, and notes the affected order history path and SQL ORDER BY concatenation. The NVD snapshot in the source item is marked Deferred.
Official resources
-
CVE-2026-45800 CVE record
CVE.org
-
CVE-2026-45800 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
Publicly disclosed on 2026-05-15 and modified on 2026-05-18. The source snapshot shows NVD vulnStatus as Deferred.