PoC Week 2025-09-22

Posted on Sep 22, 2025

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.

N.B. This is the first week I’m noticing the new NIST descriptions are written in quite a homogenous way, starting with ‘X is a software which does Y…’ They also seem more verbose than usual. Rollout of description-writing LLMs at NIST?

CVE-2025-43300

  • Severity: 8.8 HIGH
  • Impacted Products: Various Apple releases prior to: macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2 and iPadOS 18.6.2
  • Description: Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
  • Remediation: Follow developer advice.
  • More Info: NVD - CVE-2025-43300
  • PoC: https://github.com/hunters-sec/CVE-2025-43300

CVE-2025-59046

  • Severity: 9.8 CRITICAL
  • Impacted Products: interactive-git-checkout
  • Description: The npm package interactive-git-checkout is an interactive command-line tool that allows users to checkout a git branch while it prompts for the branch name on the command-line. It is available as an npm package and can be installed via npm install -g interactive-git-checkout. Versions up to and including 1.1.4 of the interactive-git-checkout tool are vulnerable to a command injection vulnerability because the software passes the branch name to the git checkout command using the Node.js child process module’s exec() function without proper input validation or sanitization. Commit 8dd832dd302af287a61611f4f85e157cd1c6bb41 fixes the issue.
  • Remediation: Follow developer advice.
  • More Info: NVD - CVE-2025-59046
  • PoC: https://github.com/ninofiliu/interactive-git-checkout/security/advisories/GHSA-4wcm-7hjf-6xw5

CVE-2025-58768

  • Severity: 9.6 CRITICAL
  • Impacted Products: Deepchat < 0.3.5
  • Description: DeepChat is a smart assistant uses artificial intelligence. Prior to version 0.3.5, in the Mermaid chart rendering component, there is a risky operation of directly using innerHTML to set user content. Therefore, any malicious content rendered via Mermaid will directly trigger the exploit chain, leading to command execution. This vulnerability is primarily caused by a failure to fully address the existing XSS issue in the project, leading to another exploit chain. The exploit chain is consistent with the report GHSA-hqr4-4gfc-5p2j, executing arbitrary JavaScript code via XSS and arbitrary commands via exposed IPC. Version 0.3.5 contains an updated fix.
  • Remediation: Follow developer advice.
  • More Info: NVD - CVE-2025-58768
  • PoC: https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j & https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-f7q5-vc93-wp6j

CVE-2025-58762

  • Severity: 9.1 CRITICAL
  • Impacted Products: Tautulli < 2.16.0
  • Description: Tautulli is a Python based monitoring and tracking tool for Plex Media Server. In Tautulli v2.15.3 and earlier, an attacker with administrative access can use the pms_image_proxy endpoint to write arbitrary python scripts into the application filesystem. This leads to remote code execution when combined with the Script notification agent. If an attacker with administrative access changes the URL of the PMS to a server they control, they can then abuse the pms_image_proxy to obtain a file write into the application filesystem. This can be done by making a pms_image_proxy request with a URL in the img parameter and the desired file name in the img_format parameter. Tautulli then uses a hash of the desired metadata together with the img_format in order to construct a file path. Since the attacker controls img_format which occupies the end of the file path, and img_format is not sanitised, the attacker can then use path traversal characters to specify filename of their choosing. If the specified file does not exist, Tautaulli will then attempt to fetch the image from the configured PMS. Since the attacker controls the PMS, they can return arbitrary content in response to this request, which will then be written into the specified file. An attacker can write an arbitrary python script into a location on the application file system. The attacker can then make use of the built-in Script notification agent to run the local script, obtaining remote code execution on the application server. Users should upgrade to version 2.16.0 to receive a patch.
  • Remediation: Follow developer advice.
  • More Info: NVD - CVE-2025-58762
  • PoC: https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j & https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-f7q5-vc93-wp6j

CVE-2025-58434

  • Severity: 9.1 CRITICAL
  • Impacted Products: Flowise <= 3.0.5
  • Description: Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5 and earlier, the forgot-password endpoint in Flowise returns sensitive information including a valid password reset tempToken without authentication or verification. This enables any attacker to generate a reset token for arbitrary users and directly reset their password, leading to a complete account takeover (ATO). This vulnerability applies to both the cloud service (cloud.flowiseai.com) and self-hosted/local Flowise deployments that expose the same API. Commit 9e178d68873eb876073846433a596590d3d9c863 in version 3.0.6 secures password reset endpoints. Several recommended remediation steps are available. Do not return reset tokens or sensitive account details in API responses. Tokens must only be delivered securely via the registered email channel. Ensure forgot-password responds with a generic success message regardless of input, to avoid user enumeration. Require strong validation of the tempToken (e.g., single-use, short expiry, tied to request origin, validated against email delivery). Apply the same fixes to both cloud and self-hosted/local deployments. Log and monitor password reset requests for suspicious activity. Consider multi-factor verification for sensitive accounts.
  • Remediation: Follow developer advice.
  • More Info: NVD - CVE-2025-58434
  • PoC: https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-wgpv-6j63-x5ph

CVE-2025-55730

  • Severity: 10 CRITICAL
  • Impacted Products: XWiki Remote Macro v 1 < 1.26.5
  • Description: XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the title in the confluence paste code macro allows remote code execution for any user who can edit any page. The classes parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution. Version 1.26.5 has a fix for the issue.
  • Remediation: Follow developer advice.
  • More Info: NVD - CVE-2025-55730
  • PoC: https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-5w8v-h22g-j2mp

CVE-2025-55727

  • Severity: 10 CRITICAL
  • Impacted Products: XWiki Remote Macro v 1 < 1.26.5
  • Description: XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the width parameter in the column macro allows remote code execution for any user who can edit any page or who can access the CKEditor converter. The width parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution when the macro has been installed by a user with programming right, or it at least allows executing Velocity code as the wiki admin. Version 1.26.5 contains a patch for the issue.
  • Remediation: Follow developer advice.
  • More Info: NVD - CVE-2025-55727
  • PoC: https://github.com/xwikisas/xwiki-pro-macros/security/advisories/GHSA-hxqp-983c-m8h9

CVE-2025-54123

  • Severity: 9.8 CRITICAL
  • Impacted Products: Hoverfly < 1.11.3
  • Description: Hoverfly is an open source API simulation tool. In versions 1.11.3 and prior, the middleware functionality in Hoverfly is vulnerable to command injection vulnerability at /api/v2/hoverfly/middleware endpoint due to insufficient validation and sanitization in user input. The vulnerability exists in the middleware management API endpoint /api/v2/hoverfly/middleware. This issue is born due to combination of three code level flaws: Insufficient Input Validation in middleware.go line 94-96; Unsafe Command Execution in local_middleware.go line 14-19; and Immediate Execution During Testing in hoverfly_service.go line 173. This allows an attacker to gain remote code execution (RCE) on any system running the vulnerable Hoverfly service. Since the input is directly passed to system commands without proper checks, an attacker can upload a malicious payload or directly execute arbitrary commands (including reverse shells) on the host server with the privileges of the Hoverfly process. Commit 17e60a9bc78826deb4b782dca1c1abd3dbe60d40 in version 1.12.0 disables the set middleware API by default, and subsequent changes to documentation make users aware of the security changes of exposing the set middleware API.
  • Remediation: Follow developer advice.
  • More Info: NVD - CVE-2025-54123
  • PoC: https://github.com/SpectoLabs/hoverfly/security/advisories/GHSA-r4h8-hfp2-ggmf

CVE-2025-52053

  • Severity: 9.8 CRITICAL
  • Impacted Products: TOTOLINK X6000R V9.4.0cu.1360_B20241207
  • Description: TOTOLINK X6000R V9.4.0cu.1360_B20241207 was found to contain a command injection vulnerability in the sub_417D74 function via the file_name parameter. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request.
  • Remediation: Follow developer advice.
  • More Info: NVD - CVE-2025-52053
  • PoC: https://github.com/w0rkd4tt/Totolink/tree/main/CVE-2025-52053

CVE-2025-4427 & CVE-2025-4428

  • Severity: 7.5 HIGH
  • Impacted Products: Ivanti Endpoint Manager Mobile 12.5.0.0
  • Description: An authentication bypass in the API component of Ivanti Endpoint Manager Mobile 12.5.0.0 and prior allows attackers to access protected resources without proper credentials via the API. Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior on unspecified platforms allows authenticated attackers to execute arbitrary code via crafted API requests.
  • Remediation: Follow developer advice.
  • More Info: NVD - CVE-2025-4427 & NVD - CVE-2025-4428
  • PoC: https://labs.watchtowr.com/expression-payloads-meet-mayhem-cve-2025-4427-and-cve-2025-4428/

CVE-2025-10183

  • Severity: 9.1 CRITICAL
  • Impacted Products: TecConnect 4.1
  • Description: A blind XML External Entity (XXE) injection in the OpenMessaging webservice in TecCom TecConnect 4.1 allows an unauthenticated attacker to exfiltrate arbitrary files to an attacker-controlled server. TecConnect 4.1 is considered end-of-life as of December 2023. Users are advised to upgrade to TecCom Connect 5.
  • Remediation: Follow developer advice.
  • More Info: NVD - CVE-2025-10183
  • PoC: https://blog.blacklanternsecurity.com/p/teccom-tecconnect-41-xml-external

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.