PoC Week 2026-01-26

Posted on Jan 26, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. Follow links with caution.

CVE-2026-20805 NEW

CVE-2026-23744 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: MCPJam inspector 1.4.2 and earlier
  • Description: MCPJam inspector is the local-first development platform for MCP servers. Versions 1.4.2 and earlier are vulnerable to remote code execution (RCE) vulnerability, which allows an attacker to send a crafted HTTP request that triggers the installation of an MCP server, leading to RCE. Since MCPJam inspector by default listens on 0.0.0.0 instead of 127.0.0.1, an attacker can trigger the RCE remotely via a simple HTTP request. Version 1.4.3 contains a patch.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-23744
  • PoC:

CVE-2026-23550 NEW

CVE-2026-22844 NEW

CVE-2026-22686

CVE-2025-64155

CVE-2025-60021 NEW

CVE-2025-12420 NEW

CVE-2023-54335

  • Severity: 9.8 CRITICAL
  • Impacted Products: eXtplorer 2.1.14
  • Description: eXtplorer 2.1.14 contains an authentication bypass vulnerability that allows attackers to login without a password by manipulating the login request. Attackers can exploit this flaw to upload malicious PHP files and execute remote commands on the vulnerable file management system.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2023-54335
  • PoC:

CVE-2022-50919

  • Severity: 9.8 CRITICAL
  • Impacted Products: Tdarr 2.00.15
  • Description: Tdarr 2.00.15 contains an unauthenticated remote code execution vulnerability in its Help terminal that allows attackers to inject and chain arbitrary commands. Attackers can exploit the lack of input filtering by chaining commands like --help; curl .py | python to execute remote code without authentication.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2022-50919
  • PoC:

CVE-2021-47796 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Denver SHC-150 Smart Wifi Camera
  • Description: Denver SHC-150 Smart Wifi Camera contains a hardcoded telnet credential vulnerability that allows unauthenticated attackers to access a Linux shell. Attackers can connect to port 23 using the default credential to execute arbitrary commands on the camera’s operating system.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2021-47796
  • PoC:

CVE-2020-36911

  • Severity: 9.8 CRITICAL
  • Impacted Products: Covenant 0.1.3 - 0.5
  • Description: Covenant 0.1.3 - 0.5 contains a remote code execution vulnerability that allows attackers to craft malicious JWT tokens with administrative privileges. Attackers can generate forged tokens with admin roles and upload custom DLL payloads to execute arbitrary commands on the target system.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2020-36911
  • PoC:

CVE-2026-24061 NEW

CVE-2026-23760 NEW

  • Severity: 9.3 CRITICAL
  • Impacted Products: SmarterTools SmarterMail versions prior to build 9511
  • Description: SmarterTools SmarterMail is affected by an authentication bypass vulnerability in its password reset API that allows unauthenticated attackers to take over system administrator accounts. This compromise can be further leveraged to achieve remote code execution with SYSTEM-level privileges on the underlying host.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-23760
  • PoC:

CVE-2026-20045 NEW

CVE-2025-61922 NEW

CVE-2025-59718

  • Severity: 9.8 CRITICAL
  • Impacted Products: Fortinet FortiOS, Fortinet FortiProxy, Fortinet FortiSwitchManager
  • Description: Fortinet FortiOS, FortiProxy, and FortiSwitchManager contain an improper verification of cryptographic signature vulnerability that allows an unauthenticated attacker to bypass FortiCloud SSO login authentication. This flaw can be exploited by sending a specially crafted SAML response message.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-59718
  • PoC:

CVE-2025-14502 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: News and Blog Designer Bundle plugin for WordPress, 1.1
  • Description: The News and Blog Designer Bundle plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1 via the template parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-14502
  • PoC:

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.