Python Exploits

5,756 exploits tracked across all sources.

Sort: Activity Stars
CVE-2014-5182 GITHUB python
Ostenta Yawpp - SQL Injection
Multiple SQL injection vulnerabilities in the yawpp plugin 1.2 for WordPress allow remote authenticated users with Contributor privileges to execute arbitrary SQL commands via vectors related to (1) admin_functions.php or (2) admin_update.php, as demonstrated by the id parameter in the update action to wp-admin/admin.php.
by certuscyber
3 stars
CVE-2025-24054 EXPLOITDB MEDIUM python
Windows NTLM - Path Traversal
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
by beatrizfn
CVSS 6.5
CVE-2025-32023 EXPLOITDB HIGH python
Redis < 6.2.19 - Remote Code Execution
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.
by Beatriz Fresno Naumova
CVSS 7.0
CVE-2025-67779 GITHUB HIGH python
Facebook React < 14.2.35 - Insecure Deserialization
It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.
by JSH-data
CVSS 7.5
CVE-2025-10370 EXPLOITDB LOW python
Sourcefabric Rpi-jukebox-rfid < 2.8.0 - Code Injection
A vulnerability was identified in MiczFlor RPi-Jukebox-RFID up to 2.8.0. This vulnerability affects unknown code of the file /htdocs/userScripts.php. The manipulation of the argument Custom script leads to cross site scripting. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
by Beatriz Fresno Naumova
CVSS 3.5
CVE-2025-10666 EXPLOITDB HIGH python
Dlink Dir-825 Firmware < 2.10 - Memory Corruption
A security flaw has been discovered in D-Link DIR-825 up to 2.10. Affected by this vulnerability is the function sub_4106d4 of the file apply.cgi. The manipulation of the argument countdown_time results in buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
by Beatriz Fresno Naumova
CVSS 8.8
CVE-2025-66478 GITHUB python
Rejected
Rejected reason: This CVE is a duplicate of CVE-2025-55182.
by wnaspy
CVE-2026-24061 GITHUB CRITICAL python
GNU Inetutils Telnet Authentication Bypass Exploit CVE-2026-24061
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.
by ridpath
1 stars
CVSS 9.8
CVE-2026-23626 GITHUB MEDIUM python
Kimai <2.46.0 - Code Injection
Kimai is a web-based multi-user time-tracking application. Prior to version 2.46.0, Kimai's export functionality uses a Twig sandbox with an overly permissive security policy (`DefaultPolicy`) that allows arbitrary method calls on objects available in the template context. An authenticated user with export permissions can deploy a malicious Twig template that extracts sensitive information including environment variables, all user password hashes, serialized session tokens, and CSRF tokens. Version 2.46.0 patches this issue.
by HUSEYNKHANLI
1 stars
CVSS 6.8
CVE-2026-21881 GITHUB CRITICAL python
Kanboard < 1.2.49 - Authentication Bypass
Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below is vulnerable to a critical authentication bypass when REVERSE_PROXY_AUTH is enabled. The application blindly trusts HTTP headers for user authentication without verifying the request originated from a trusted reverse proxy. An attacker can impersonate any user, including administrators, by simply sending a spoofed HTTP header. This issue is fixed in version 1.2.49.
by HUSEYNKHANLI
1 stars
CVSS 9.1
CVE-2026-21880 GITHUB MEDIUM python
Kanboard < 1.2.49 - Information Disclosure
Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below have an LDAP Injection vulnerability in the LDAP authentication mechanism. User-supplied input is directly substituted into LDAP search filters without proper sanitization, allowing attackers to enumerate all LDAP users, discover sensitive user attributes, and perform targeted attacks against specific accounts. This issue is fixed in version 1.2.49.
by HUSEYNKHANLI
1 stars
CVSS 5.3
CVE-2026-21879 GITHUB MEDIUM python
Kanboard < 1.2.49 - Open Redirect
Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below are vulnerable to an Open Redirect attack that allows malicious actors to redirect authenticated users to attacker-controlled websites. By crafting URLs such as //evil.com, attackers can bypass the filter_var($url, FILTER_VALIDATE_URL) validation check. This vulnerability could be exploited to conduct phishing attacks, steal user credentials, or distribute malware. The issue is fixed in version 1.2.49.
by HUSEYNKHANLI
1 stars
CVSS 4.7
CVE-2026-22794 GITHUB CRITICAL python
Appsmith < 1.93 - Origin Validation Error
Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.93, the server uses the Origin value from the request headers as the email link baseUrl without validation. If an attacker controls the Origin, password reset / email verification links in emails can be generated pointing to the attacker’s domain, causing authentication tokens to be exposed and potentially leading to account takeover. This vulnerability is fixed in 1.93.
by exploitChains
2 stars
CVSS 9.6
CVE-2026-21858 GITHUB CRITICAL python
N8n < 1.121.0 - Improper Input Validation
n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage. This issue is fixed in version 1.121.0.
by exploitChains
2 stars
CVSS 10.0
CVE-2025-64155 GITHUB CRITICAL python
Fortinet Fortisiem < 7.1.9 - OS Command Injection
An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests.
by exploitChains
2 stars
CVSS 9.8
CVE-2025-6389 GITHUB CRITICAL python
Sneeit Framework <8.3 - RCE
The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.
by exploitChains
2 stars
CVSS 9.8
CVE-2025-55182 GITHUB CRITICAL python
React Server Components <19.2.0 - RCE
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
by exploitChains
2 stars
CVSS 10.0
CVE-2025-15158 GITHUB HIGH python
WP Enable WebP <1.0 - File Upload
The WP Enable WebP plugin for WordPress is vulnerable to arbitrary file uploads due to improper file type validation in the 'wpse_file_and_ext_webp' function in all versions up to, and including, 1.0. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
by exploitChains
2 stars
CVSS 8.8
CVE-2025-30397 GITHUB HIGH python
Microsoft Scripting Engine - RCE
Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.
by Leviticus-Triage
13 stars
CVSS 7.5
CVE-2025-2857 GITHUB CRITICAL python
Mozilla Firefox < 136.0.4 - Exposure to Wrong Actor
Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 136.0.4, Firefox ESR 128.8.1, and Firefox ESR 115.21.1.
by Leviticus-Triage
13 stars
CVSS 10.0
CVE-2025-2783 GITHUB HIGH python
Mojo in Google Chrome <134.0.6998.177 - RCE
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
by Leviticus-Triage
13 stars
CVSS 8.3
CVE-2025-57174 EXPLOITDB CRITICAL python
Siklu Communications Etherhaul - RCE
An issue was discovered in Siklu Communications Etherhaul 8010TX and 1200FX devices, Firmware 7.4.0 through 10.7.3 and possibly other previous versions. The rfpiped service listening on TCP port 555 which uses static AES encryption keys hardcoded in the binary. These keys are identical across all devices, allowing attackers to craft encrypted packets that execute arbitrary commands without authentication. This is a failed patch for CVE-2017-7318. This issue may affect other Etherhaul series devices with shared firmware.
by semaja2
CVSS 9.8
CVE-2025-57176 EXPLOITDB MEDIUM python
Ceragon Networks EtherHaul - Unauthenticated File Upload
On Ceragon Networks / Siklu Communication EtherHaul and MultiHaul Series microwave antennas before 2026-03-10, the rfpiped service on TCP port 555 allows unauthenticated file uploads to any writable location on the device. File upload packets use weak encryption (metadata only) with file contents transmitted in cleartext. No authentication or path validation is performed.
by semaja2
CVSS 6.5
CVE-2025-10327 EXPLOITDB MEDIUM python
Sourcefabric Rpi-jukebox-rfid < 2.8.0 - Command Injection
A weakness has been identified in MiczFlor RPi-Jukebox-RFID up to 2.8.0. Affected by this vulnerability is an unknown functionality of the file /htdocs/api/playlist/shuffle.php. Executing manipulation of the argument playlist can lead to os command injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
by Beatriz Fresno Naumova
CVSS 6.3
CVE-2025-41068 GITHUB HIGH python
Open5gs < 2.7.5 - Reachable Assertion
Reachable Assertion vulnerability in Open5GS up to version 2.7.6 allows attackers with connectivity to the NRF to cause a denial of service. This is achieved by sending the creation of an NF with an invalid type via SBI and then requesting its data. The NRF executes a check that crashes the process, leaving the discovery service unresponsive.
by xvk1t1
CVSS 7.5