PoC Week 2025-12-08

Posted on Dec 8, 2025

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. Follow links with caution.

CVE-2025-53770

CVE-2025-53771

CVE-2025-55182

CVE-2025-66401

  • Severity: 9.8 CRITICAL
  • Impacted Products: MCP Watch 0.1.2 and earlier
  • Description: MCP Watch is a comprehensive security scanner for Model Context Protocol (MCP) servers. In 0.1.2 and earlier, the MCPScanner class contains a critical Command Injection vulnerability in the cloneRepo method. The application passes the user-supplied githubUrl argument directly to a system shell via execSync without sanitization. This allows an attacker to execute arbitrary commands on the host machine by appending shell metacharacters to the URL.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-66401
  • PoC:

CVE-2025-6389

  • Severity: 9.8 CRITICAL
  • Impacted Products: Sneeit Framework plugin for WordPress, 8.3
  • Description: The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-6389
  • PoC:

CVE-2025-59390

  • Severity: 9.8 CRITICAL
  • Impacted Products: Apache Druid 34.0.0
  • Description: Apache Druid’s Kerberos authenticator, when not explicitly configured with druid.auth.authenticator.kerberos.cookieSignatureSecret, generates a weak fallback secret using ThreadLocalRandom, enabling potential authentication bypass or token forgery. This also causes authentication failures in distributed deployments due to inconsistent secrets across nodes.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-59390
  • PoC:

CVE-2025-58360

  • Severity: 8.2 HIGH
  • Impacted Products: GeoServer from version 2.26.0 to before 2.26.2 and before 2.25.6
  • Description: GeoServer is an open source server that allows users to share and edit geospatial data. An XML External Entity (XXE) vulnerability was identified. The application accepts XML input through a specific endpoint /geoserver/wms operation GetMap. However, this input is not sufficiently sanitized or restricted, allowing an attacker to define external entities within the XML request. This issue has been patched in GeoServer 2.25.6, GeoServer 2….
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-58360
  • PoC:

CVE-2025-51682

  • Severity: 9.8 CRITICAL
  • Impacted Products: mJobtime 15.7.2
  • Description: mJobtime 15.7.2 handles authorization on the client side, which allows an attacker to modify the client-side code and gain access to administrative features. Additionally, they can craft requests based on the client-side code to call these administrative functions directly.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-51682
  • PoC:

CVE-2025-41744

CVE-2025-13595

  • Severity: 9.8 CRITICAL
  • Impacted Products: CIBELES AI plugin for WordPress, 1.10.8
  • Description: The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the ‘actualizador_git.php’ file in all versions up to, and including, 1.10.8. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site’s server which may make remote code execution possible.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-13595
  • PoC:

CVE-2025-66478

CVE-2025-6554

CVE-2025-61757

CVE-2025-13486

CVE-2022-43939

CVE-2022-43769

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.