Critical Vulnerabilities with Public Exploits
Updated 25m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2025-45887
9.1
CRITICAL
1 PoC
EPSS 0.00
Wanglongcn Yifang - SSRF
Yifang CMS v2.0.2 is vulnerable to Server-Side Request Forgery (SSRF) in /api/file/getRemoteContent.
CWE-918
May 09, 2025
CVE-2025-29287
9.8
CRITICAL
1 PoC
EPSS 0.02
Mingsoft Mcms < 5.4.4 - Unrestricted File Upload
An arbitrary file upload vulnerability in the ueditor component of MCMS v5.4.3 allows attackers to execute arbitrary code via uploading a crafted file.
CWE-434
Apr 21, 2025
CVE-2025-26014
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.02
Olajowon Loggrove - Code Injection
A Remote Code Execution (RCE) vulnerability in Loggrove v.1.0 allows a remote attacker to execute arbitrary code via the path parameter.
CWE-94
Feb 21, 2025
CVE-2025-69564
9.8
CRITICAL
1 PoC
EPSS 0.00
Fabian Mobile Shop Management System - Code Injection
code-projects Mobile Shop Management System 1.0 is vulnerable to SQL Injection in /ExAddNewUser.php via the Name, Address, email, UserName, Password, confirm_password, Role, Branch, and Activate parameters.
CWE-94
Jan 27, 2026
CVE-2025-69563
9.8
CRITICAL
1 PoC
EPSS 0.00
Fabian Mobile Shop Management System - SQL Injection
code-projects Mobile Shop Management System 1.0 is vulnerable to SQL Injection in /ExLogin.php via the Password parameter.
CWE-89
Jan 27, 2026
CVE-2025-69562
9.8
CRITICAL
1 PoC
EPSS 0.00
Fabian Mobile Shop Management System - SQL Injection
code-projects Mobile Shop Management System 1.0 is vulnerable to SQL Injection in /insertmessage.php via the userid parameter.
CWE-89
Jan 27, 2026
CVE-2025-69565
9.8
CRITICAL
1 PoC
EPSS 0.00
Fabian Mobile Shop Management System - Unrestricted File Upload
code-projects Mobile Shop Management System 1.0 is vulnerable to File Upload in /ExAddProduct.php.
CWE-434
Jan 27, 2026
CVE-2025-70985
9.1
CRITICAL
1 PoC
EPSS 0.00
Ruoyi - Improper Access Control
Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily modify data outside of their scope.
CWE-284
Jan 23, 2026
CVE-2025-48913
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Apache CXF <3.6.8-4.1.3 - RCE
If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility.
Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.
CWE-20
Aug 08, 2025
CVE-2025-6000
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
Vault <1.20.1 - Code Injection
A privileged Vault operator within the root namespace with write permission to {{sys/audit}} may obtain code execution on the underlying host if a plugin directory is set in Vault’s configuration. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.
CWE-94
Aug 01, 2025
CVE-2025-50213
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Apache Airflow Providers Snowflake <6.4.0 - Special Element Injection
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) vulnerability in Apache Airflow Providers Snowflake.
This issue affects Apache Airflow Providers Snowflake: before 6.4.0.
Sanitation of table and stage parameters were added in CopyFromExternalStageToSnowflakeOperator to prevent SQL injection
Users are recommended to upgrade to version 6.4.0, which fixes the issue.
CWE-75
Jun 24, 2025
CVE-2025-27528
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
Apache InLong <2.2.0 - Deserialization
Deserialization of Untrusted Data vulnerability in Apache InLong.
This issue affects Apache InLong: from 1.13.0 through 2.1.0.
This
vulnerability allows attackers to bypass the security mechanisms of InLong
JDBC and leads to arbitrary file reading. Users are advised to upgrade to Apache InLong's 2.2.0 or cherry-pick [1] to solve it.
[1] https://github.com/apache/inlong/pull/11747
CWE-502
May 28, 2025
CVE-2025-14931
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.05
Hugging Face smolagents - Deserialization
Hugging Face smolagents Remote Python Executor Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face smolagents. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the parsing of pickle data. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-28312.
CWE-502
Dec 23, 2025
CVE-2025-67895
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Apache-airflow-providers-edge3 < 2.0.0 - Remote Code Execution
Edge3 Worker RPC RCE on Airflow 2.
This issue affects Apache Airflow Providers Edge3: before 2.0.0 - and only if you installed and configured it on Airflow 2.
The Edge3 provider support in Airflow 2 has been always development-only and not officially released, however if you installed and configured Edge3 provider in Airflow 2, it implicitly enabled non-public (normally) API which was used to test Edge Provider in Airflow 2 during the development. This API allowed Dag author to perform Remote Code Execution in the webserver context, which Dag Author was not supposed to be able to do.
If you installed and configured Edge3 provider for Airflow 2, you should uninstall it and migrate to Airflow 3. The new Edge3 provider versions (>=2.0.0) has minimum version of Airflow set to 3 and the RCE-prone Airflow 2 code is removed, so it should no longer be possible to use the Edge3 provider 2.0.0+ on Airflow 2.
If you used Edge Provider in Airflow 3, you are not affected.
CWE-669
Dec 17, 2025
CVE-2025-66489
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Cal.com <5.9.8 - Auth Bypass
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
CWE-303
Dec 03, 2025
CVE-2025-12421
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.00
Mattermost <11.0.2, 10.12.1, 10.11.4, 10.5.12 - Auth Bypass
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
CWE-303
Nov 27, 2025
CVE-2025-59390
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Apache Druid < 35.0.0 - Authentication Bypass
Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`,
which is not a crypto-graphically secure random number generator. This
may allow an attacker to predict or brute force the secret used to sign
authentication cookies, potentially enabling token forgery or
authentication bypass. Additionally, each process generates its own
fallback secret, resulting in inconsistent secrets across nodes. This
causes authentication failures in distributed or multi-broker
deployments, effectively leading to a incorrectly configured clusters. Users are
advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret`
This issue affects Apache Druid: through 34.0.0.
Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.kerberos.cookieSignatureSecret` when using the Kerberos authenticator. Services will fail to come up if the secret is not set.
CWE-338
Nov 26, 2025
CVE-2025-62515
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.01
Pypi Pyquokka - Insecure Deserialization
pyquokka is a framework for making data lakes work for time series. In versions 0.3.1 and prior, the FlightServer class directly uses pickle.loads() to deserialize action bodies received from Flight clients without any sanitization or validation in the do_action() method. The vulnerable code is located in pyquokka/flight.py at line 283 where arbitrary data from Flight clients is directly passed to pickle.loads(). When FlightServer is configured to listen on 0.0.0.0, this allows attackers across the entire network to perform arbitrary remote code execution by sending malicious pickled payloads through the set_configs action. Additional vulnerability points exist in the cache_garbage_collect, do_put, and do_get functions where pickle.loads is used to deserialize untrusted remote data.
CWE-502
Oct 17, 2025
CVE-2025-11539
9.9
CRITICAL
1 PoC
Analysis
EPSS 0.00
Grafana Image Renderer - RCE
Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process.
Instances are vulnerable if:
1. The default token ("authToken") is not changed, or is known to the attacker.
2. The attacker can reach the image renderer endpoint.
This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16.
CWE-94
Oct 09, 2025
CVE-2025-58046
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.02
Dataease < 2.10.13 - Insecure Deserialization
Dataease is an open-source data visualization and analysis platform. In versions up to and including 2.10.12, the Impala data source is vulnerable to remote code execution due to insufficient filtering in the getJdbc method of the io.dataease.datasource.type.Impala class. Attackers can construct malicious JDBC connection strings that exploit JNDI injection and trigger RMI deserialization, ultimately enabling remote command execution. The vulnerability can be exploited by editing the data source and providing a crafted JDBC connection string that references a remote configuration file, leading to RMI-based deserialization attacks. This issue has been patched in version 2.10.13. It is recommended to upgrade to the latest version. No known workarounds exist for affected versions.
CWE-502
Sep 15, 2025