Python Exploits

5,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2024-20767 EXPLOITDB HIGH python
CVE-2024-20767 - Adobe Coldfusion Arbitrary File Read
ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet.
by İbrahimsql
CVSS 7.4
CVE-2025-6018 EXPLOITDB HIGH python
Linux PAM - Privilege Escalation
A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
by İbrahimsql
CVSS 7.8
CVE-2020-36847 EXPLOITDB CRITICAL python
Simple-File-List Plugin <4.2.2 - RCE
The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.
by Md Amanat Ullah (xSwads)
CVSS 9.8
CVE-2025-34077 EXPLOITDB CRITICAL python
WordPress Pie Register <3.7.1.4 - Auth Bypass
An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators. Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server.
by Md Amanat Ullah (xSwads)
CVE-2025-6019 GITHUB HIGH python
libblockdev - Privilege Escalation
A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.
by dreysanox
6 stars
CVSS 7.0
CVE-2025-1550 EXPLOITDB CRITICAL python
Keras < 3.8.0 - Code Injection
The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.
by Mohammed Idrees Banyamer
CVSS 9.8
CVE-2025-27210 EXPLOITDB HIGH python
Node.js - Path Traversal
An incomplete fix has been identified for CVE-2025-23084 in Node.js, specifically affecting Windows device names like CON, PRN, and AUX. This vulnerability affects Windows users of `path.join` API.
by Abdualhadi khalifa
CVSS 7.5
CVE-2025-3248 EXPLOITDB CRITICAL python
Langflow AI - Unauthenticated Remote Code Execution
Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.
by Raghad Abdallah Al-syouf
CVSS 9.8
CVE-2025-47175 EXPLOITDB HIGH python
Microsoft 365 Apps - Use After Free
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
by Mohammed Idrees Banyamer
CVSS 7.8
CVE-2024-47773 EXPLOITDB HIGH python
Discourse - XSS
Discourse is an open source platform for community discussion. An attacker can make several XHR requests until the cache is poisoned with a response without any preloaded data. This issue only affects anonymous visitors of the site. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should disable anonymous cache by setting the `DISCOURSE_DISABLE_ANON_CACHE` environment variable to a non-empty value.
by İbrahimsql
CVSS 8.2
CVE-2025-47228 EXPLOITDB MEDIUM python
Netmake ScriptCase <9.12.006 - Command Injection
In the Production Environment extension in Netmake ScriptCase through 9.12.006 (23), shell injection in the SSH connection settings allows authenticated attackers to execute system commands via crafted HTTP requests.
by Alexandre ZANNI
CVSS 6.7
CVE-2022-35411 GITHUB CRITICAL python
Rpc.py < 0.6.0 - Insufficiently Protected Credentials
rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
by Boon-Rekcah
CVSS 9.8
CVE-2007-2447 GITHUB python
Samba 3.0.0-3.0.25rc3 - Command Injection
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
by Boon-Rekcah
CVE-2004-2687 GITHUB python
distcc 2.x - RCE
distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks.
by Boon-Rekcah
CVE-2024-43425 EXPLOITDB HIGH python
Moodle Remote Code Execution (CVE-2024-43425)
A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions.
by Likhith Appalaneni
CVSS 8.1
CVE-2025-47812 EXPLOITDB CRITICAL python
Wing FTP Server NULL-byte Authentication Bypass (CVE-2025-47812)
In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
by 4m3rr0r
CVSS 10.0
CVE-2024-39930 EXPLOITDB CRITICAL python
Gogs < 0.13.0 - Remote Code Execution
The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
by cybersploit
CVSS 9.9
CVE-2024-45699 GITHUB MEDIUM python
Zabbix < 6.0.37 - XSS
The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.
by milo2012
CVSS 5.4
CVE-2024-36991 GITHUB HIGH python
Splunk < 9.0.10 - Path Traversal
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
by milo2012
CVSS 7.5
CVE-2024-36469 GITHUB LOW python
Zabbix 5.0.0 through 5.0.46 - Information Disclosure via Login Timing
Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.
by milo2012
CVSS 3.1
CVE-2024-36465 GITHUB HIGH python
Zabbix - SQL Injection
A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
by milo2012
CVSS 8.8
CVE-2025-47165 EXPLOITDB HIGH python
Microsoft 365 Apps < 16.0.10417.20018 - Use After Free
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
by nu11secur1ty
CVSS 7.8
CVE-2019-9978 EXPLOITDB MEDIUM python
Social Warfare <3.5.3 - Stored XSS
The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.
by Huseyin Mardinli
CVSS 6.1
CVE-2025-27218 EXPLOITDB MEDIUM python
Sitecore Experience Manager (XM)/Experience Platform (XP) 10.4 - Insecure Deserialization
Sitecore Experience Manager (XM) and Experience Platform (XP) 10.4 before KB1002844 allow remote code execution through insecure deserialization.
by Yesith Alvarez
CVSS 5.3
CVE-2025-49132 EXPLOITDB CRITICAL python
Pterodactyl Panel < 1.11.11 - Code Injection
Pterodactyl is a free, open-source game server management panel. Prior to version 1.11.11, using the /locales/locale.json with the locale and namespace query parameters, a malicious actor is able to execute arbitrary code without being authenticated. With the ability to execute arbitrary code it could be used to gain access to the Panel's server, read credentials from the Panel's config, extract sensitive information from the database, access files of servers managed by the panel, etc. This issue has been patched in version 1.11.11. There are no software workarounds for this vulnerability, but use of an external Web Application Firewall (WAF) could help mitigate this attack.
by Zen-kun04
CVSS 10.0