PoC Week 2026-02-09

Posted on Feb 9, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. Follow links with caution.

CVE-2026-24858

CVE-2025-40554 NEW

CVE-2026-25142 NEW

CVE-2026-25130 NEW

  • Severity: 9.6 CRITICAL
  • Impacted Products: Cybersecurity AI (CAI) 0.5.10
  • Description: Cybersecurity AI (CAI) is a framework for AI Security. In versions up to and including 0.5.10, the CAI (Cybersecurity AI) framework contains multiple argument injection vulnerabilities in its function tools. User-controlled input is passed directly to shell commands via subprocess.Popen() with shell=True, allowing attackers to execute arbitrary commands on the host system. The find\_file() tool executes without requiring user approval because find is considered a “safe” pre-approved com…
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-25130
  • PoC:

CVE-2026-24841

CVE-2026-1056 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Snow Monkey Forms plugin for WordPress, 12.0.3
  • Description: The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ‘generate_user_dirpath’ function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-1056
  • PoC:

CVE-2025-51958 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: aelsantex runcommand 2014-04-01, DokuWiki
  • Description: aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated attackers to execute arbitrary system commands via lib/plugins/runcommand/postaction.php.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-51958
  • PoC:

CVE-2025-15467 NEW

CVE-2025-10878 NEW

  • Severity: 10.0 CRITICAL
  • Impacted Products: Fikir Odalari AdminPando 1.0.1
  • Description: A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 before 2026-01-26. The username and password parameters are vulnerable to SQL injection, allowing unauthenticated attackers to bypass authentication completely. Successful exploitation grants full administrative access to the application, including the ability to manipulate the public-facing website content (HTML/DOM manipulation).
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-10878
  • PoC:

CVE-2026-21509

CVE-2025-8088

CVE-2025-11953

  • Severity: 9.8 CRITICAL
  • Impacted Products: Metro Development Server
  • Description: The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-11953
  • PoC:

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.