PoC Week 2026-02-01

Posted on Feb 1, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. Follow links with caution.

CVE-2026-21509 NEW

CVE-2026-24858 NEW

CVE-2026-24061

CVE-2026-23760

  • Severity: Unknown
  • Impacted Products: SmarterTools SmarterMail versions prior to build 9511
  • Description: SmarterTools SmarterMail is affected by an authentication bypass vulnerability in its password reset API that allows unauthenticated attackers to take over system administrator accounts. This compromise can be further leveraged to achieve remote code execution with SYSTEM-level privileges on the underlying host.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-23760
  • PoC:

CVE-2026-20045

CVE-2026-24841 NEW

CVE-2026-22844

CVE-2026-0920 NEW

CVE-2025-59718

  • Severity: 9.8 CRITICAL
  • Impacted Products: Fortinet FortiOS, Fortinet FortiProxy, Fortinet FortiSwitchManager
  • Description: Fortinet FortiOS, FortiProxy, and FortiSwitchManager contain an improper verification of cryptographic signature vulnerability that allows an unauthenticated attacker to bypass FortiCloud SSO login authentication. This flaw can be exploited by sending a specially crafted SAML response message.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-59718
  • PoC:

CVE-2025-56005 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: PLY 3.11
  • Description: The PLY (Python Lex-Yacc) library is affected by a deserialization vulnerability in the yacc() function that allows for remote code execution. This issue stems from the use of an undocumented parameter that processes untrusted serialized data.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-56005
  • PoC:

CVE-2024-37081 NEW

CVE-2021-47900 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Gila CMS versions prior to 2.0.0
  • Description: Gila CMS versions prior to 2.0.0 contain a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through manipulated HTTP headers. Attackers can inject PHP code in the User-Agent header with shell_exec() to run system commands by sending crafted requests to the admin endpoint.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2021-47900
  • PoC:

CVE-2021-47891 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Unified Remote 3.9.0.2463
  • Description: Unified Remote 3.9.0.2463 contains a remote code execution vulnerability that allows attackers to send crafted network packets to execute arbitrary commands. Attackers can exploit the service by connecting to port 9512 and sending specially crafted packets to open a command prompt and download and execute malicious payloads.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2021-47891
  • PoC:

CVE-2021-47748 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Hasura GraphQL 1.3.3
  • Description: Hasura GraphQL 1.3.3 contains a remote code execution vulnerability that allows attackers to execute arbitrary shell commands through SQL query manipulation. Attackers can inject commands into the run_sql endpoint by crafting malicious GraphQL queries that execute system commands through PostgreSQL’s COPY FROM PROGRAM functionality.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2021-47748
  • PoC:

CVE-2020-36948 NEW

  • Severity: 8.8 HIGH
  • Impacted Products: VestaCP 0.9.8-26
  • Description: VestaCP 0.9.8-26 contains a session token vulnerability in the LoginAs module that allows remote attackers to manipulate authentication tokens. Attackers can exploit insufficient token validation to access user accounts and perform unauthorized login requests without proper administrative permissions.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2020-36948
  • PoC:

CVE-2025-12420

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.