Vulnerabilities Exploited in the Wild with Public PoC
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,390 results
Clear all
CVE-2025-71243
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.85
SPIP Saisies 5.4.0-5.11.0 - RCE
The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should immediately update to version 5.11.1 or later.
CWE-94
Feb 19, 2026
CVE-2025-1338
7.3
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.14
NUUO Camera <20250203 - Command Injection
A vulnerability was found in NUUO Camera up to 20250203. It has been declared as critical. This vulnerability affects the function print_file of the file /handle_config.php. The manipulation of the argument log leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-74
Feb 16, 2025
CVE-2025-27817
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.20
Apache Kafka Client - Arbitrary File Read
A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Apache Kafka Clients accept configuration data for setting the SASL/OAUTHBEARER connection with the brokers, including "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url". Apache Kafka allows clients to read an arbitrary file and return the content in the error log, or sending requests to an unintended location. In applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers may use the "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url" configuratin to read arbitrary contents of the disk and environment variables or make requests to an unintended location. In particular, this flaw may be used in Apache Kafka Connect to escalate from REST API access to filesystem/environment/URL access, which may be undesirable in certain environments, including SaaS products.
Since Apache Kafka 3.9.1/4.0.0, we have added a system property ("-Dorg.apache.kafka.sasl.oauthbearer.allowed.urls") to set the allowed urls in SASL JAAS configuration. In 3.9.1, it accepts all urls by default for backward compatibility. However in 4.0.0 and newer, the default value is empty list and users have to set the allowed urls explicitly.
CWE-918
Jun 10, 2025
CVE-2025-59528
10.0
CRITICAL
EXPLOITED
11 PoCs
Analysis
NUCLEI
EPSS 0.84
Flowise < 3.0.6 - Code Injection
Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation. Specifically, inside the convertToValidJSONString function, user input is directly passed to the Function() constructor, which evaluates and executes the input as JavaScript code. Since this runs with full Node.js runtime privileges, it can access dangerous modules such as child_process and fs. This issue has been patched in version 3.0.6.
CWE-94
Sep 22, 2025
CVE-2025-71257
7.3
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.08
BMC FootPrints ITSM 20.20.02 <= 20.24.01.001 Authentication Bypass
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized access to application data and modify system resources. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
CWE-306
Mar 19, 2026
CVE-2025-10090
7.3
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.01
Jinher OA < 1.2 - Injection
A flaw has been found in Jinher OA up to 1.2. The impacted element is an unknown function of the file /C6/Jhsoft.Web.departments/GetTreeDate.aspx. Executing manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used.
CWE-74
Sep 08, 2025
CVE-2025-54726
9.3
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.01
Miguel Useche JS Archive List - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows SQL Injection.This issue affects JS Archive List: from n/a through < 6.1.6.
CWE-89
Aug 20, 2025
CVE-2025-8266
6.3
MEDIUM
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.01
Chancms < 3.1.3 - Insecure Deserialization
A vulnerability has been found in yanyutao0402 ChanCMS up to 3.1.2 and classified as critical. Affected by this vulnerability is the function getArticle of the file app/modules/cms/controller/collect.js. The manipulation of the argument targetUrl leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. It is recommended to upgrade the affected component.
CWE-502
Jul 28, 2025
CVE-2025-31277
8.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.00
Apple Safari < 18.6 - Memory Corruption
The issue was addressed with improved memory handling. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing maliciously crafted web content may lead to memory corruption.
CWE-119
Jul 30, 2025
CVE-2025-54068
9.8
CRITICAL
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.53
Laravel Livewire < 3.6.4 - Code Injection
Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction. This issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible. No known workarounds are available.
CWE-94
Jul 17, 2025
CVE-2025-32432
10.0
CRITICAL
KEV
8 PoCs
Analysis
NUCLEI
EPSS 0.88
CraftCMS - Remote Code Execution
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
CWE-94
Apr 25, 2025
CVE-2025-68613
9.9
CRITICAL
KEV
36 PoCs
Analysis
NUCLEI
EPSS 0.78
n8n Workflow Expression Remote Code Execution
n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.
CWE-913
Dec 19, 2025
CVE-2025-34117
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.50
Netcore/Netis <Aug 2014 - RCE
A remote code execution vulnerability exists in multiple Netcore and Netis routers models with firmware released prior to August 2014 due to the presence of an undocumented backdoor listener on UDP port 53413. Exact version boundaries remain undocumented. An unauthenticated remote attacker can send specially crafted UDP packets to execute arbitrary commands on the affected device. This backdoor uses a hardcoded authentication mechanism and accepts shell commands post-authentication. Some device models include a non-standard implementation of the `echo` command, which may affect exploitability.
CWE-306
Jul 16, 2025
CVE-2025-52089
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.03
Totolink N300rb Firmware - Missing Authentication
A hidden remote support feature protected by a static secret in TOTOLINK N300RB firmware version 8.54 allows an authenticated attacker to execute arbitrary OS commands with root privileges.
CWE-306
Jul 11, 2025
CVE-2025-10353
CRITICAL
EXPLOITED
2 PoCs
1 Writeup
Analysis
NUCLEI
EPSS 0.01
Melisplatform Melis-cms-slider < 5.3.1 - Remote Code Execution
File upload leading to remote code execution (RCE) in the “melis-cms-slider” module of Melis Technology's Melis Platform. This vulnerability allows an attacker to upload a malicious file via a POST request to '/melis/MelisCmsSlider/MelisCmsSliderDetails/saveDetailsForm' using the 'mcsdetail_img' parameter.
CWE-43
Oct 08, 2025
CVE-2025-26399
9.8
CRITICAL
KEV
1 PoC
Analysis
EPSS 0.27
Solarwinds Web Help Desk < 12.8.6 - Insecure Deserialization
SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.
CWE-502
Sep 23, 2025
CVE-2025-68461
7.2
HIGH
KEV
2 PoCs
Analysis
EPSS 0.09
Roundcube Webmail < 1.5.12 - XSS
Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-Scripting (XSS) vulnerability via the animate tag in an SVG document.
CWE-79
Dec 18, 2025
CVE-2025-49113
9.9
CRITICAL
KEV
30 PoCs
Analysis
NUCLEI
EPSS 0.90
Roundcube Webmail < 1.5.10 - Insecure Deserialization
Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.
CWE-502
Jun 02, 2025
CVE-2025-15556
7.5
HIGH
KEV
3 PoCs
Analysis
EPSS 0.06
Notepad-plus-plus Notepad++ < 8.8.9 - Download Without Integrity Check
Notepad++ versions prior to 8.8.9, when using the WinGUp updater, contain an update integrity verification vulnerability where downloaded update metadata and installers are not cryptographically verified. An attacker able to intercept or redirect update traffic can cause the updater to download and execute an attacker-controlled installer, resulting in arbitrary code execution with the privileges of the user.
CWE-494
Feb 03, 2026
CVE-2025-40536
8.1
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.69
SolarWinds Web Help Desk unauthenticated RCE
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality.
CWE-693
Jan 28, 2026