CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
5,334 results Clear all
CVE-2026-25196 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the Wi-Fi SSID and/or password fields can lead to remote code execution when the configuration is processed.
CWE-78 Feb 27, 2026
CVE-2026-25105 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into parameters of the Modbus command tool in the debug route.
CWE-78 Feb 27, 2026
CVE-2026-25037 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by configuring a maliciously crafted LCD state which is later processed during system setup, enabling remote code execution.
CWE-78 Feb 27, 2026
CVE-2026-24452 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <=1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by supplying a crafted template file to the devices route.
CWE-78 Feb 27, 2026
CVE-2026-23702 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by sending malicious input injected into the server username field of the import preconfiguration action in the API V1 route.
CWE-78 Feb 27, 2026
CVE-2026-20764 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by providing malicious input via the device hostname configuration which is later processed during system setup, resulting in remote code execution.
CWE-78 Feb 27, 2026
CVE-2026-25195 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by supplying a crafted firmware update file via the firmware update route.
CWE-78 Feb 27, 2026
CVE-2026-25111 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into requests sent to the restore route.
CWE-78 Feb 27, 2026
CVE-2026-25109 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the devices field when accessing the get setup route, leading to remote code execution.
CWE-78 Feb 27, 2026
CVE-2026-24695 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into OpenSSL argument fields within requests sent to the utility route, leading to remote code execution.
CWE-78 Feb 27, 2026
CVE-2026-24689 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the devices field of the firmware update apply action.
CWE-78 Feb 27, 2026
CVE-2026-24663 9.0 CRITICAL 1 Writeup EPSS 0.01
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an unauthenticated attacker to achieve remote code execution on the system by sending a crafted request to the libraries installation route and injecting malicious input into the request body.
CWE-78 Feb 27, 2026
CVE-2026-24517 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into requests sent to the firmware update route.
CWE-78 Feb 27, 2026
CVE-2026-21389 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the request body sent to the contacts import route.
CWE-78 Feb 27, 2026
CVE-2026-20910 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the devices field of the firmware update update action to achieve remote code execution.
CWE-78 Feb 27, 2026
CVE-2026-20902 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <=1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the map filename field during the map upload action of the parameters route.
CWE-78 Feb 27, 2026
CVE-2026-20742 8.0 HIGH 1 Writeup EPSS 0.00
XWEB Pro <1.12.1 - Command Injection
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into requests sent to the templates route.
CWE-78 Feb 27, 2026
CVE-2026-28279 7.3 HIGH EPSS 0.00
osctrl <0.5.0 - Command Injection
osctrl is an osquery management solution. Prior to version 0.5.0, an OS command injection vulnerability exists in the `osctrl-admin` environment configuration. An authenticated administrator can inject arbitrary shell commands via the hostname parameter when creating or editing environments. These commands are embedded into enrollment one-liner scripts generated using Go's `text/template` package (which does not perform shell escaping) and execute on every endpoint that enrolls using the compromised environment. An attacker with administrator access can achieve remote code execution on every endpoint that enrolls using the compromised environment. Commands execute as root/SYSTEM (the privilege level used for osquery enrollment) before osquery is installed, leaving no agent-level audit trail. This enables backdoor installation, credential exfiltration, and full endpoint compromise. This is fixed in osctrl `v0.5.0`. As a workaround, restrict osctrl administrator access to trusted personnel, review existing environment configurations for suspicious hostnames, and/or monitor enrollment scripts for unexpected commands.
CWE-78 Feb 26, 2026
CVE-2026-28269 5.9 MEDIUM EPSS 0.00
Kiteworks <9.2.0 - Command Injection
Kiteworks is a private data network (PDN). Prior to version 9.2.0, avulnerability in Kiteworks command execution functionality allows authenticated users to redirect command output to arbitrary file locations. This could be exploited to overwrite critical system files and gain elevated access. Version 9.2.0 contains a patch.
CWE-78 Feb 26, 2026
CVE-2026-28207 6.6 MEDIUM 1 PoC Analysis EPSS 0.00
Zen C <0.4.2 - Command Injection
Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.2, a command injection vulnerability (CWE-78) in the Zen C compiler allows local attackers to execute arbitrary shell commands by providing a specially crafted output filename via the `-o` command-line argument. The vulnerability existed in the `main` application logic (specifically in `src/main.c`), where the compiler constructed a shell command string to invoke the backend C compiler. This command string was built by concatenating various arguments, including the user-controlled output filename, and was subsequently executed using the `system()` function. Because `system()` invokes a shell to parse and execute the command, shell metacharacters within the output filename were interpreted by the shell, leading to arbitrary command execution. An attacker who can influence the command-line arguments passed to the `zc` compiler (like through a build script or a CI/CD pipeline configuration) can execute arbitrary commands with the privileges of the user running the compiler. The vulnerability has been fixed in version 0.4.2 by removing `system()` calls, implementing `ArgList`, and internal argument handling. Users are advised to update to Zen C version v0.4.2 or later.
CWE-78 Feb 26, 2026