Latest Vulnerabilities with Public Exploits

Updated 7m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
53,627 results Clear all
CVE-2026-25732 7.5 HIGH 2 PoCs Analysis EPSS 0.00
Pypi Nicegui < 3.7.0 - Path Traversal
NiceGUI is a Python-based UI framework. Prior to 3.7.0, NiceGUI's FileUpload.name property exposes client-supplied filename metadata without sanitization, enabling path traversal when developers use the pattern UPLOAD_DIR / file.name. Malicious filenames containing ../ sequences allow attackers to write files outside intended directories, with potential for remote code execution through application file overwrites in vulnerable deployment patterns. This design creates a prevalent security footgun affecting applications following common community patterns. Note: Exploitation requires application code incorporating file.name into filesystem paths without sanitization. Applications using fixed paths, generated filenames, or explicit sanitization are not affected. This vulnerability is fixed in 3.7.0.
CWE-22 Feb 06, 2026
CVE-2026-25731 7.8 HIGH 2 PoCs Analysis EPSS 0.00
Calibre <9.2.0 - Code Injection
calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre's Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via the --template-html or --template-html-index command-line options. This vulnerability is fixed in 9.2.0.
CWE-1336 Feb 06, 2026
CVE-2026-24135 8.1 HIGH 2 PoCs Analysis EPSS 0.00
Gogs <0.13.3 - Path Traversal
Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, a path traversal vulnerability exists in the updateWikiPage function of Gogs. The vulnerability allows an authenticated user with write access to a repository's wiki to delete arbitrary files on the server by manipulating the old_title parameter in the wiki editing form. This issue has been patched in versions 0.13.4 and 0.14.0+dev.
CWE-22 Feb 06, 2026
CVE-2026-1337 5.4 MEDIUM 2 PoCs Analysis EPSS 0.00
Neo4j < 2026.01 - XSS
Insufficient escaping of unicode characters in query log in Neo4j Enterprise and Community editions prior to 2026.01 can lead to XSS if the user opens the logs in a tool that treats them as HTML. There is no security impact on Neo4j products, but this advisory is released as a precaution to treat the logs as plain text if using versions prior to 2026.01. Proof of concept exploit:  https://github.com/JoakimBulow/CVE-2026-1337
CWE-117 Feb 06, 2026
CVE-2026-24300 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Azure Front Door - Privilege Escalation
Azure Front Door Elevation of Privilege Vulnerability
CWE-284 Feb 05, 2026
CVE-2026-1953 HIGH 2 PoCs Analysis EPSS 0.00
Nukegraphic CMS v3.1.2 - XSS
Nukegraphic CMS v3.1.2 contains a stored cross-site scripting (XSS) vulnerability in the user profile edit functionality at /ngc-cms/user-edit-profile.php. The application fails to properly sanitize user input in the name field before storing it in the database and rendering it across multiple CMS pages. An authenticated attacker with low privileges can inject malicious JavaScript payloads through the profile edit request, which are then executed site-wide whenever the affected user's name is displayed. This allows the attacker to execute arbitrary JavaScript in the context of other users' sessions, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of victims.
CWE-79 Feb 05, 2026
CVE-2026-25546 7.8 HIGH 2 PoCs Analysis EPSS 0.00
Coding-solo Godot-mcp < 0.1.1 - OS Command Injection
Godot MCP is a Model Context Protocol (MCP) server for interacting with the Godot game engine. Prior to version 0.1.1, a command injection vulnerability in godot-mcp allows remote code execution. The executeOperation function passed user-controlled input (e.g., projectPath) directly to exec(), which spawns a shell. An attacker could inject shell metacharacters like $(command) or &calc to execute arbitrary commands with the privileges of the MCP server process. This affects any tool that accepts projectPath, including create_scene, add_node, load_sprite, and others. This issue has been patched in version 0.1.1.
CWE-78 Feb 04, 2026
CVE-2026-25526 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
JinJava <2.7.6, <2.8.3 - RCE
JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.
CWE-1336 Feb 04, 2026
CVE-2026-25512 8.8 HIGH 3 PoCs Analysis NUCLEI EPSS 0.24
Group-office Group Office < 6.8.150 - OS Command Injection
Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.150, 25.0.82, and 26.0.5, there is a remote code execution (RCE) vulnerability in Group-Office. The endpoint email/message/tnefAttachmentFromTempFile directly concatenates the user-controlled parameter tmp_file into an exec() call. By injecting shell metacharacters into tmp_file, an authenticated attacker can execute arbitrary system commands on the server. This issue has been patched in versions 6.8.150, 25.0.82, and 26.0.5.
CWE-78 Feb 04, 2026
CVE-2026-25053 9.9 CRITICAL 2 PoCs Analysis EPSS 0.00
N8n < 1.123.0 - OS Command Injection
n8n is an open source workflow automation platform. Prior to versions 1.123.10 and 2.5.0, vulnerabilities in the Git node allowed authenticated users with permission to create or modify workflows to execute arbitrary system commands or read arbitrary files on the n8n host. This issue has been patched in versions 1.123.10 and 2.5.0.
CWE-78 Feb 04, 2026
CVE-2026-24514 6.5 MEDIUM 2 PoCs Analysis EPSS 0.00
Ingress-Nginx - DoS
A security issue was discovered in ingress-nginx where the validating admission controller feature is subject to a denial of service condition. By sending large requests to the validating admission controller, an attacker can cause memory consumption, which may result in the ingress-nginx controller pod being killed or the node running out of memory.
CWE-770 Feb 03, 2026
CVE-2026-1862 8.8 HIGH 2 PoCs Analysis EPSS 0.00
Google Chrome <144.0.7559.132 - Heap Corruption
Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843 Feb 03, 2026
CVE-2026-20404 6.5 MEDIUM 2 PoCs Analysis EPSS 0.00
Modem - DoS
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689248; Issue ID: MSV-4837.
CWE-787 Feb 02, 2026
CVE-2026-25130 9.6 CRITICAL 2 PoCs Analysis EPSS 0.00
Pypi Cai-framework - OS Command Injection
Cybersecurity AI (CAI) is a framework for AI Security. In versions up to and including 0.5.10, the CAI (Cybersecurity AI) framework contains multiple argument injection vulnerabilities in its function tools. User-controlled input is passed directly to shell commands via `subprocess.Popen()` with `shell=True`, allowing attackers to execute arbitrary commands on the host system. The `find_file()` tool executes without requiring user approval because find is considered a "safe" pre-approved command. This means an attacker can achieve Remote Code Execution (RCE) by injecting malicious arguments (like -exec) into the args parameter, completely bypassing any human-in-the-loop safety mechanisms. Commit e22a1220f764e2d7cf9da6d6144926f53ca01cde contains a fix.
CWE-78 Jan 30, 2026
CVE-2026-25050 5.3 MEDIUM 2 PoCs Analysis EPSS 0.00
Vendure <3.5.3 - Info Disclosure
Vendure is an open-source headless commerce platform. Prior to version 3.5.3, the `NativeAuthenticationStrategy.authenticate()` method is vulnerable to a timing attack that allows attackers to enumerate valid usernames (email addresses). In `packages/core/src/config/auth/native-authentication-strategy.ts`, the authenticate method returns immediately if a user is not found. The significant timing difference (~200-400ms for bcrypt vs ~1-5ms for DB miss) allows attackers to reliably distinguish between existing and non-existing accounts. Version 3.5.3 fixes the issue.
CWE-202 Jan 30, 2026
CVE-2026-24854 8.8 HIGH 2 PoCs Analysis EPSS 0.00
ChurchCRM <6.7.2 - SQL Injection
ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in endpoint `/PaddleNumEditor.php` in ChurchCRM prior to version 6.7.2. Any authenticated user, including one with zero assigned permissions, can exploit SQL injection through the `PerID` parameter. Version 6.7.2 contains a patch for the issue.
CWE-89 Jan 30, 2026
CVE-2026-25211 3.2 LOW 2 PoCs Analysis EPSS 0.00
Pypi Llama-stack < 0.4.4 - Log Information Exposure
Llama Stack (aka llama-stack) before 0.4.0rc3 does not censor the pgvector password in the initialization log.
CWE-532 Jan 30, 2026
CVE-2026-25126 7.1 HIGH 2 PoCs Analysis EPSS 0.00
PolarLearn <0-PRERELEASE-15 - Info Disclosure
PolarLearn is a free and open-source learning program. Prior to version 0-PRERELEASE-15, the vote API route (`POST /api/v1/forum/vote`) trusts the JSON body’s `direction` value without runtime validation. TypeScript types are not enforced at runtime, so an attacker can send arbitrary strings (e.g., `"x"`) as `direction`. Downstream (`VoteServer`) treats any non-`"up"` and non-`null` value as a downvote and persists the invalid value in `votes_data`. This can be exploited to bypass intended business logic. Version 0-PRERELEASE-15 fixes the vulnerability.
CWE-20 Jan 29, 2026
CVE-2026-25047 8.8 HIGH 2 PoCs Analysis EPSS 0.00
NPM Deephas < 1.0.8 - Prototype Pollution
deepHas provides a test for the existence of a nested object key and optionally returns that key. A prototype pollution vulnerability exists in version 1.0.7 of the deephas npm package that allows an attacker to modify global object behavior. This issue was fixed in version 1.0.8.
CWE-1321 Jan 29, 2026
CVE-2026-1281 9.8 CRITICAL KEV 3 PoCs Analysis EPSS 0.79
Ivanti Endpoint Manager Mobile (EPMM) unauthenticated RCE
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
CWE-94 Jan 29, 2026