PoC Week 2026-02-23

Posted on Feb 23, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. I don’t vouch for any links in this list: follow them with caution.

CVE-2026-21533

CVE-2026-21510

CVE-2017-11882

CVE-2026-2441 NEW

CVE-2026-21531

CVE-2026-26190 NEW

CVE-2026-26021 NEW

CVE-2026-24061

CVE-2026-2249 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: METIS DFS devices (versions <= oscore 2.1.234-r18)
  • Description: METIS DFS devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with ‘daemon’ privileges. This results in the compromise of the software, granting unauthorized access to modify configuration, read and alter sensitive data, or disrupt services.
  • Remediation:
  • More Info: NVD - CVE-2026-2249
  • PoC:

CVE-2026-1729 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: AdForest theme for WordPress, 6.0.12
  • Description: The AdForest theme for WordPress is vulnerable to authentication bypass in all versions up to, and including, 6.0.12. This is due to the plugin not properly verifying a user’s identity prior to authenticating them through the ‘sb_login_user_with_otp_fun’ function. This makes it possible for unauthenticated attackers to log in as arbitrary users, including administrators.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-1729
  • PoC:

CVE-2026-1490 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress, all versions up to, and including
  • Description: The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the ‘checkWithoutToken’ function in all versions up to, and including, 6.71. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. Note:…
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-1490
  • PoC:

CVE-2026-1357 NEW

CVE-2026-1306 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: midi-Synth plugin for WordPress, 1.1.0
  • Description: The midi-Synth plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type and file extension validation in the ‘export’ AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible granted the attacker can obtain a valid nonce. The nonce is exposed in frontend JavaScript making it trivially accessible to unauthenticat…
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-1306
  • PoC:

CVE-2025-8572 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Truelysell Core plugin for WordPress, 1.8.7
  • Description: The Truelysell Core plugin for WordPress is vulnerable to privilege escalation in versions less than, or equal to, 1.8.7. This is due to insufficient validation of the user_role parameter during user registration. This makes it possible for unauthenticated attackers to create accounts with elevated privileges, including administrator access.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-8572
  • PoC:

CVE-2025-70830 NEW

  • Severity: 9.9 CRITICAL
  • Impacted Products: Datart v1.0.0-rc.3
  • Description: A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-70830
  • PoC:

CVE-2025-70314 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: webfsd 1.21
  • Description: webfsd 1.21 is vulnerable to a Buffer Overflow via a crafted request. This is due to the filename variable
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-70314
  • PoC:

CVE-2025-69872 NEW

CVE-2025-69633 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6
  • Description: A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController parameter in the popup controller. The parameter is passed unsanitized to SQL queries in classes/AdvancedPopup.php (getPopups() and updateVisits() functions).
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-69633
  • PoC:

CVE-2025-43529 NEW

CVE-2025-14174 NEW

CVE-2019-25319 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Domain Quester Pro 6.02
  • Description: Domain Quester Pro 6.02 contains a stack overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload targeting the ‘Domain Name Keywords’ input field to trigger an access violation and execute a bind shell on port 9999.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2019-25319
  • PoC:

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.