Python Exploits

5,725 exploits tracked across all sources.

Sort: Activity Stars
CVE-2026-1862 GITHUB HIGH python
Google Chrome <144.0.7559.132 - Heap Corruption
Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
by XiaomingX
10 stars
CVSS 8.8
CVE-2026-1844 GITHUB HIGH python
PixelYourSite PRO <12.4.0.2 - XSS
The PixelYourSite PRO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pysTrafficSource' parameter and the 'pys_landing_page' parameter in all versions up to, and including, 12.4.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
by XiaomingX
10 stars
CVSS 7.2
CVE-2026-1731 GITHUB CRITICAL python
BeyondTrust RS/PRA - RCE
BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.
by XiaomingX
10 stars
CVSS 9.8
CVE-2026-1729 GITHUB CRITICAL python
AdForest theme <6.0.12 - Auth Bypass
The AdForest theme for WordPress is vulnerable to authentication bypass in all versions up to, and including, 6.0.12. This is due to the plugin not properly verifying a user's identity prior to authenticating them through the 'sb_login_user_with_otp_fun' function. This makes it possible for unauthenticated attackers to log in as arbitrary users, including administrators.
by XiaomingX
10 stars
CVSS 9.8
CVE-2026-1560 GITHUB HIGH python
WordPress Lazy Blocks <4.2.0 - Authenticated RCE
The Custom Block Builder – Lazy Blocks plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.0 via multiple functions in the 'LazyBlocks_Blocks' class. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
by XiaomingX
10 stars
CVSS 8.8
CVE-2026-1490 GITHUB CRITICAL python
CleanTalk <6.71 - Auth Bypass
The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all versions up to, and including, 6.71. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. Note: This is only exploitable on sites with an invalid API key.
by XiaomingX
10 stars
CVSS 9.8
CVE-2026-1457 GITHUB HIGH python
TP-Link VIGI C385 V1 - Buffer Overflow
An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.
by XiaomingX
10 stars
CVSS 8.8
CVE-2026-1405 GITHUB CRITICAL python
Slider Future Plugin <1.0.5 - RCE
The Slider Future plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'slider_future_handle_image_upload' function in all versions up to, and including, 1.0.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
by XiaomingX
10 stars
CVSS 9.8
CVE-2026-1357 GITHUB CRITICAL python
WPvivid Backup & Migration <0.9.123 - Unauthenticated RCE
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Upload in versions up to and including 0.9.123. This is due to improper error handling in the RSA decryption process combined with a lack of path sanitization when writing uploaded files. When the plugin fails to decrypt a session key using openssl_private_decrypt(), it does not terminate execution and instead passes the boolean false value to the phpseclib library's AES cipher initialization. The library treats this false value as a string of null bytes, allowing an attacker to encrypt a malicious payload using a predictable null-byte key. Additionally, the plugin accepts filenames from the decrypted payload without sanitization, enabling directory traversal to escape the protected backup directory. This makes it possible for unauthenticated attackers to upload arbitrary PHP files to publicly accessible directories and achieve Remote Code Execution via the wpvivid_action=send_to_site parameter.
by XiaomingX
10 stars
CVSS 9.8
CVE-2026-1337 GITHUB MEDIUM python
Neo4j < 2026.01 - XSS
Insufficient escaping of unicode characters in query log in Neo4j Enterprise and Community editions prior to 2026.01 can lead to XSS if the user opens the logs in a tool that treats them as HTML. There is no security impact on Neo4j products, but this advisory is released as a precaution to treat the logs as plain text if using versions prior to 2026.01. Proof of concept exploit:  https://github.com/JoakimBulow/CVE-2026-1337
by XiaomingX
10 stars
CVSS 5.4
CVE-2026-1306 GITHUB CRITICAL python
Midi-Synth <1.1.0 - Unauthenticated RCE
The midi-Synth plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type and file extension validation in the 'export' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible granted the attacker can obtain a valid nonce. The nonce is exposed in frontend JavaScript making it trivially accessible to unauthenticated attackers.
by XiaomingX
10 stars
CVSS 9.8
CVE-2026-1281 GITHUB CRITICAL python
Ivanti Endpoint Manager Mobile (EPMM) unauthenticated RCE
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
by XiaomingX
10 stars
CVSS 9.8
CVE-2026-0770 GITHUB CRITICAL python
Langflow - RCE
Langflow exec_globals Inclusion of Functionality from Untrusted Control Sphere Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the exec_globals parameter provided to the validate endpoint. The issue results from the inclusion of a resource from an untrusted control sphere. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27325.
by XiaomingX
10 stars
CVSS 9.8
CVE-2026-0745 GITHUB MEDIUM python
User Language Switch <1.6.10 - SSRF
The User Language Switch plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.6.10 due to missing URL validation on the 'download_language()' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
by XiaomingX
10 stars
CVSS 5.5
CVE-2026-0628 GITHUB HIGH python
Google Chrome < 143.0.7499.192 - Missing Authorization
Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)
by XiaomingX
10 stars
CVSS 8.8
CVE-2025-8572 GITHUB CRITICAL python
Truelysell Core <1.8.7 - Privilege Escalation
The Truelysell Core plugin for WordPress is vulnerable to privilege escalation in versions less than, or equal to, 1.8.7. This is due to insufficient validation of the user_role parameter during user registration. This makes it possible for unauthenticated attackers to create accounts with elevated privileges, including administrator access.
by XiaomingX
10 stars
CVSS 9.8
CVE-2025-8110 GITHUB HIGH python
Gogs < 0.13.3 - Path Traversal
Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code.
by XiaomingX
10 stars
CVSS 8.8
CVE-2025-68721 GITHUB HIGH python
Axigen Mail Server <10.5.57 - Privilege Escalation
Axigen Mail Server before 10.5.57 contains an improper access control vulnerability in the WebAdmin interface. A delegated admin account with zero permissions can bypass access control checks and gain unauthorized access to the SSL Certificates management endpoint (page=sslcerts). This allows the attacker to view, download, upload, and delete SSL certificate files, despite lacking the necessary privileges to access the Security & Filtering section.
by XiaomingX
10 stars
CVSS 8.1
CVE-2025-67644 GITHUB HIGH python
Pypi Langgraph-checkpoint-sqlite < 3.0.1 - SQL Injection
LangGraph SQLite Checkpoint is an implementation of LangGraph CheckpointSaver that uses SQLite DB (both sync and async, via aiosqlite). Versions 3.0.0 and below are vulnerable to SQL injection through the checkpoint implementation. Checkpoint allows attackers to manipulate SQL queries through metadata filter keys, affecting applications that accept untrusted metadata filter keys (not just filter values) in checkpoint search operations. The _metadata_predicate() function constructs SQL queries by interpolating filter keys directly into f-strings without validation. This issue is fixed in version 3.0.1.
by XiaomingX
10 stars
CVSS 7.3
CVE-2025-64459 GITHUB CRITICAL python
Django < 4.2.26 - SQL Injection
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the `_connector` argument. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank cyberstan for reporting this issue.
by XiaomingX
10 stars
CVSS 9.1
CVE-2025-64155 GITHUB CRITICAL python
Fortinet Fortisiem < 7.1.9 - OS Command Injection
An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests.
by XiaomingX
10 stars
CVSS 9.8
CVE-2025-61882 GITHUB CRITICAL python
Oracle E-Business Suite CVE-2025-61882 RCE
Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
by XiaomingX
10 stars
CVSS 9.8
CVE-2025-61183 GITHUB MEDIUM python
vaahcms <2.3.1 - XSS
Cross Site Scripting in vaahcms v.2.3.1 allows a remote attacker to execute arbitrary code via upload method in the storeAvatar() method of UserBase.php
by XiaomingX
10 stars
CVSS 6.1
CVE-2025-59470 GITHUB CRITICAL python
Veeam Backup & Replication < 13.0.1.1071 - Command Injection
This vulnerability allows a Backup Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
by XiaomingX
10 stars
CVSS 9.0
CVE-2025-55182 GITHUB CRITICAL python
React Server Components <19.2.0 - RCE
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
by XiaomingX
10 stars
CVSS 10.0