PoC Week 2025-07-21
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2025-5777
- Severity: 7.5 HIGH
- Impacted Products: NetScaler
- Description: Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-5777
- PoC: https://github.com/orange0Mint/CitrixBleed-2-CVE-2025-5777
CVE-2025-49812
- Severity: 10.0 CRITICAL
- Impacted Products: Wing FTP Server before 7.4.4
- Description: In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle ‘\0’ bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-49812
- PoC: https://github.com/4m3rr0r/CVE-2025-47812-poc
CVE-2025-52376
- Severity: 10.0 CRITICAL
- Impacted Products: Nexxt Solutions NCM-X1800 Mesh Router firmware UV1.2.7 and below
- Description: An authentication bypass vulnerability in the /web/um-open-telnet.cgi endpoint in Nexxt Solutions NCM-X1800 Mesh Router firmware UV1.2.7 and below, allowing an attacker to remotely enable the Telnet service without authentication, bypassing security controls. The Telnet server is then accessible with hard-coded credentials, allowing attackers to gain administrative shell access and execute arbitrary commands on the device.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-52376
- PoC: https://github.com/Vagebondcur/nexxt-solutions-NCM-X1800-exploits/tree/main/CVE-2025-52376
CVE-2025-7340
- Severity: 9.8 CRITICAL
- Impacted Products: The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress
- Description: The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the temp_file_upload function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-7340
- PoC: https://github.com/Nxploited/CVE-2025-7340
CVE-2025-6934
- Severity: 9.8 CRITICAL
- Impacted Products: The Opal Estate Pro – Property Management and Submission plugin for WordPress
- Description: The Opal Estate Pro – Property Management and Submission plugin for WordPress, used by the FullHouse - Real Estate Responsive WordPress Theme, is vulnerable to privilege escalation via in all versions up to, and including, 1.7.5. This is due to a lack of role restriction during registration in the ‘on-regiser-user’ function. This makes it possible for unauthenticated attackers to arbitrarily choose the role, including the Administrator role, assigned when registering.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-6934
- PoC: https://github.com/Nxploited/CVE-2025-6934
CVE-2025-53890
- Severity: 9.8 CRITICAL
- Impacted Products: pyload < 0.5.0b3.dev89
- Description: pyload is an open-source Download Manager written in pure Python. An unsafe JavaScript evaluation vulnerability in pyLoad’s CAPTCHA processing code allows unauthenticated remote attackers to execute arbitrary code in the client browser and potentially the backend server. Exploitation requires no user interaction or authentication and can result in session hijacking, credential theft, and full system remote code execution. Commit 909e5c97885237530d1264cfceb5555870eb9546, the patch for the issue, is included in version 0.5.0b3.dev89.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-53890
- PoC: https://github.com/pyload/pyload/security/advisories/GHSA-8w3f-4r8f-pf53
CVE-2025-49029
- Severity: 9.1 CRITICAL
- Impacted Products: Custom Login And Signup Widget: from n/a through 1.0
- Description: Improper Control of Generation of Code (‘Code Injection’) vulnerability in bitto.Kazi Custom Login And Signup Widget allows Code Injection.This issue affects Custom Login And Signup Widget: from n/a through 1.0.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-49029
- PoC: https://github.com/Nxploited/CVE-2025-49029/
CVE-2025-48384
- Severity: 8 HIGH
- Impacted Products: git prior to v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1
- Description: Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-48384
- PoC: https://github.com/nguyentranbaotran/cve-2025-48384-poc/
CVE-2025-45814
- Severity: 9.8 CRITICAL
- Impacted Products: Novelsat NS3000 v8.1.1.125110 , v7.2.8.124852 , and v7.x and NS2000 v7.02.08
- Description: Missing authentication checks in the query.fcgi endpoint of NS3000 v8.1.1.125110 , v7.2.8.124852 , and v7.x and NS2000 v7.02.08 allows attackers to execute a session hijacking attack.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-45814
- PoC: https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-45814
CVE-2025-45814
- Severity: 10.0 CRITICAL
- Impacted Products: Cisco ISE and Cisco ISE-PIC
- Description: A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-45814
- PoC: https://github.com/abrewer251/CVE-2025-20281-2-Cisco-ISE-RCE
CVE-2025-25257
- Severity: 9.8 CRITICAL
- Impacted Products: Fortinet FortiWeb version 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10 and below 7.0.10
- Description: An improper neutralization of special elements used in an SQL command (‘SQL Injection’) vulnerability [CWE-89] in Fortinet FortiWeb version 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10 and below 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-25257
- PoC: https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257
References
This list was scraped from the quite amazing and highly recommended newsletters below:
Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.