PoC Week 2026-02-01
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. Follow links with caution.
CVE-2026-21509 NEW
- Severity: 7.8 HIGH
- Impacted Products: Microsoft Office, Microsoft 365
- Description: Microsoft Office is affected by a security feature bypass vulnerability due to a reliance on untrusted inputs in a security decision. This flaw allows an attacker to circumvent mitigations designed to protect users from vulnerable COM/OLE controls.
- Remediation:
- More Info: NVD - CVE-2026-21509
- PoC:
CVE-2026-24858 NEW
- Severity: 9.8 CRITICAL
- Impacted Products: Fortinet FortiOS, Fortinet FortiManager, Fortinet FortiAnalyzer, Fortinet FortiProxy
- Description: Fortinet FortiOS, FortiManager, FortiAnalyzer, and FortiProxy are affected by an authentication bypass vulnerability in the FortiCloud Single Sign-On (SSO) implementation. This flaw allows an attacker with a valid FortiCloud account to gain unauthorized administrative access to other registered devices.
- Remediation:
- More Info: NVD - CVE-2026-24858
- PoC:
CVE-2026-24061
- Severity: 9.8 CRITICAL
- Impacted Products: GNU Inetutils 1.9.3 through 2.7
- Description: GNU Inetutils telnetd is affected by an argument injection vulnerability that allows remote, unauthenticated attackers to bypass authentication and gain root access. This flaw occurs because the daemon fails to sanitize the USER environment variable before passing it to the system’s login utility.
- Remediation:
- More Info: NVD - CVE-2026-24061
- PoC:
CVE-2026-23760
- Severity: Unknown
- Impacted Products: SmarterTools SmarterMail versions prior to build 9511
- Description: SmarterTools SmarterMail is affected by an authentication bypass vulnerability in its password reset API that allows unauthenticated attackers to take over system administrator accounts. This compromise can be further leveraged to achieve remote code execution with SYSTEM-level privileges on the underlying host.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2026-23760
- PoC:
CVE-2026-20045
- Severity: 9.8 CRITICAL
- Impacted Products: Unified Communications Manager, Unified CM Session Management Edition, Unified CM IM & Presence Service, Cisco Unity Connection, Cisco Webex Calling Dedicated Instance
- Description: Cisco Unified Communications products are affected by a code injection vulnerability in their web-based management interface that allows for remote command execution. This issue stems from improper validation of user-supplied input within HTTP requests.
- Remediation:
- More Info: NVD - CVE-2026-20045
- PoC:
CVE-2026-24841 NEW
- Severity: 9.9 CRITICAL
- Impacted Products: Dokploy < 0.26.6
- Description: Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy’s WebSocket endpoint
/docker-container-terminal. ThecontainerIdandactiveWayparameters are directly interpolated into shell commands without sanitization, allowing authenticated attackers to execute arbitrary commands on the host server. Version 0.26.6 fixes the issue. - Remediation:
- More Info: NVD - CVE-2026-24841
- PoC:
CVE-2026-22844
- Severity: 9.9 CRITICAL
- Impacted Products: Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0
- Description: A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote code execution of the MMR via network access.
- Remediation:
- More Info: NVD - CVE-2026-22844
- PoC:
CVE-2026-0920 NEW
- Severity: 9.8 CRITICAL
- Impacted Products: LA-Studio Element Kit for Elementor, 1.5.6.3
- Description: The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to unauthorized administrative user creation in versions up to and including 1.5.6.3. Unauthenticated attackers can exploit this flaw to register new accounts with full administrator privileges.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2026-0920
- PoC:
CVE-2025-59718
- Severity: 9.8 CRITICAL
- Impacted Products: Fortinet FortiOS, Fortinet FortiProxy, Fortinet FortiSwitchManager
- Description: Fortinet FortiOS, FortiProxy, and FortiSwitchManager contain an improper verification of cryptographic signature vulnerability that allows an unauthenticated attacker to bypass FortiCloud SSO login authentication. This flaw can be exploited by sending a specially crafted SAML response message.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59718
- PoC:
CVE-2025-56005 NEW
- Severity: 9.8 CRITICAL
- Impacted Products: PLY 3.11
- Description: The PLY (Python Lex-Yacc) library is affected by a deserialization vulnerability in the yacc() function that allows for remote code execution. This issue stems from the use of an undocumented parameter that processes untrusted serialized data.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-56005
- PoC:
CVE-2024-37081 NEW
- Severity: 7.8 HIGH
- Impacted Products: Broadcom VMware vCenter Server
- Description: Broadcom VMware vCenter Server could allow a local authenticated attacker to gain elevated privileges on the system, caused by misconfiguration of sudo. An attacker could exploit this vulnerability to elevate privileges to root on vCenter Server Appliance.
- Remediation:
- More Info: NVD - CVE-2024-37081
- PoC:
CVE-2021-47900 NEW
- Severity: 9.8 CRITICAL
- Impacted Products: Gila CMS versions prior to 2.0.0
- Description: Gila CMS versions prior to 2.0.0 contain a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through manipulated HTTP headers. Attackers can inject PHP code in the User-Agent header with shell_exec() to run system commands by sending crafted requests to the admin endpoint.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2021-47900
- PoC:
CVE-2021-47891 NEW
- Severity: 9.8 CRITICAL
- Impacted Products: Unified Remote 3.9.0.2463
- Description: Unified Remote 3.9.0.2463 contains a remote code execution vulnerability that allows attackers to send crafted network packets to execute arbitrary commands. Attackers can exploit the service by connecting to port 9512 and sending specially crafted packets to open a command prompt and download and execute malicious payloads.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2021-47891
- PoC:
CVE-2021-47748 NEW
- Severity: 9.8 CRITICAL
- Impacted Products: Hasura GraphQL 1.3.3
- Description: Hasura GraphQL 1.3.3 contains a remote code execution vulnerability that allows attackers to execute arbitrary shell commands through SQL query manipulation. Attackers can inject commands into the run_sql endpoint by crafting malicious GraphQL queries that execute system commands through PostgreSQL’s COPY FROM PROGRAM functionality.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2021-47748
- PoC:
CVE-2020-36948 NEW
- Severity: 8.8 HIGH
- Impacted Products: VestaCP 0.9.8-26
- Description: VestaCP 0.9.8-26 contains a session token vulnerability in the LoginAs module that allows remote attackers to manipulate authentication tokens. Attackers can exploit insufficient token validation to access user accounts and perform unauthorized login requests without proper administrative permissions.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2020-36948
- PoC:
CVE-2025-12420
- Severity: Unknown
- Impacted Products: ServiceNow AI Platform, Now Assist AI Agents, Virtual Agent API
- Description: ServiceNow AI Platform is affected by an improper authentication vulnerability that allows an unauthenticated remote attacker to impersonate other users. This flaw enables the attacker to perform actions with the permissions of the impersonated account.
- Remediation:
- More Info: NVD - CVE-2025-12420
- PoC:
References
This list was scraped from the quite amazing and highly recommended newsletters below:
Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.