PoC Week 2026-01-12

Posted on Jan 12, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. Follow links with caution.

CVE-2025-69286 NEW

CVE-2025-68926 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: RustFS versions prior to 1.0.0-alpha.77
  • Description: RustFS is affected by a hard-coded credentials vulnerability within its gRPC authentication mechanism that allows for a complete security bypass. This flaw enables remote attackers to authenticate to the system using a publicly available static token.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-68926
  • PoC:

CVE-2025-65212 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: NJHYST HY511 POE core before 2.1, plugins before 0.1
  • Description: An issue was discovered in NJHYST HY511 POE core before 2.1 and plugins before 0.1. The vulnerability stems from the device’s insufficient cookie verification, allowing an attacker to directly request the configuration file address and download the core configuration file without logging into the device management backend.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-65212
  • PoC:

CVE-2025-50343 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: matio 1.5.28
  • Description: An issue was discovered in matio 1.5.28. A heap-based memory corruption can occur in Mat_VarCreateStruct() when the nfields value does not match the actual number of strings in the fields array. This leads to out-of-bounds reads and invalid memory frees during cleanup, potentially causing a segmentation fault or heap corruption.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-50343
  • PoC:

CVE-2025-14998 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Branda plugin for WordPress, 3.4.24
  • Description: The Branda plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.4.24. This is due to the plugin not properly validating a user’s identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user’s passwords, including administrators, and leverage that to gain access to their account.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-14998
  • PoC:

CVE-2025-14847

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.