PoC Week 2026-03-16

Posted on Mar 16, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. I don’t vouch for any links in this list: follow them with caution.

CVE-2026-28289 NEW

CVE-2026-24898 NEW

CVE-2026-2628 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login plugin for WordPress, 2.2.5
  • Description: The All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.2.5. This makes it possible for unauthenticated attackers to bypass authentication and log in as other users, including administrators.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-2628
  • PoC:

CVE-2026-1492 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin for WordPress, 5.1.2
  • Description: The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to improper privilege management in all versions up to, and including, 5.1.2. This is due to the plugin accepting a user-supplied role during membership registration without properly enforcing a server-side allowlist. This makes it possible for unauthenticated attackers to create administrator accounts by sup…
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-1492
  • PoC:

CVE-2026-27636 NEW

CVE-2026-20127

CVE-2026-3703 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Wavlink NU516U1 251208
  • Description: A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to out-of-bounds write. The attack may be performed from remote. The exploit has been published and may be used. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-3703
  • PoC:

CVE-2026-30957 NEW

CVE-2026-30863 NEW

CVE-2026-30862 NEW

  • Severity: 9.0 CRITICAL
  • Impacted Products: Appsmith, 1.96
  • Description: Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.96, a Critical Stored XSS vulnerability exists in the Table Widget (TableWidgetV2). The root cause is a lack of HTML sanitization in the React component rendering pipeline, allowing malicious attributes to be interpolated into the DOM. By leveraging the “Invite Users” feature, an attacker with a regular user account (user@gmail.com) can force a System Administrator to execute a high-privileged API call (/…
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-30862
  • PoC:

CVE-2026-29042 NEW

CVE-2026-29000 NEW

  • Severity: 9.1 CRITICAL
  • Impacted Products: pac4j-jwt 4.5.9, pac4j-jwt 5.7.9, pac4j-jwt 6.3.3
  • Description: pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 are affected by an authentication bypass vulnerability in the JwtAuthenticator component when processing encrypted JSON Web Tokens (JWTs). This flaw allows remote attackers to forge authentication tokens and impersonate any user, including administrators, by providing a specially crafted encrypted token.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-29000
  • PoC:

CVE-2026-28802 NEW

CVE-2026-28794 NEW

CVE-2026-27966 NEW

CVE-2026-27944 NEW

CVE-2026-27849 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: MR9600: 1.0.4.205530, MX4200: 1.0.13.210200
  • Description: Due to missing neutralization of special elements, OS commands can be injected via the update functionality of a TLS-SRP connection, which is normally used for configuring devices inside the mesh network. This issue affects MR9600: 1.0.4.205530; MX4200: 1.0.13.210200.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-27849
  • PoC:

CVE-2026-27626 NEW

  • Severity: 9.9 CRITICAL
  • Impacted Products: OliveTin 3000.10.0
  • Description: OliveTin is affected by an OS command injection vulnerability that allows for arbitrary code execution through improper input validation in its shell command interface. This issue stems from two distinct vectors involving the failure to sanitize password-typed arguments and the bypass of safety checks during webhook processing.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-27626
  • PoC:

CVE-2026-27606 NEW

CVE-2026-27507

  • Severity: 9.8 CRITICAL
  • Impacted Products: Binardat 10G08-0800GSM network switch firmware V300SP10260209 and prior
  • Description: Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded administrative credentials that cannot be changed by users. Knowledge of these credentials allows full administrative access to the device.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-27507
  • PoC:

CVE-2026-26198

CVE-2026-26030

CVE-2026-25177 NEW

CVE-2025-69985 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: FUXA 1.2.8 and prior
  • Description: FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP “Referer” header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server’s host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary N…
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-69985
  • PoC:

CVE-2025-62878 NEW

  • Severity: 9.9 CRITICAL
  • Impacted Products: Rancher Local Path Provisioner
  • Description: A malicious user can manipulate the parameters.pathPattern to create PersistentVolumes in arbitrary locations on the host node, potentially overwriting sensitive files or gaining access to unintended directories.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-62878
  • PoC:

CVE-2025-54309

  • Severity: 9.8 CRITICAL
  • Impacted Products: CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23
  • Description: CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
  • Remediation: Follow developer advice.
  • More Info: NVD - CVE-2025-54309
  • PoC: https://github.com/issamjr/CVE-2025-54309-EXPLOIT

CVE-2025-50187 NEW

CVE-2025-31161

CVE-2025-15467

CVE-2025-1242 NEW

  • Severity: 9.1 CRITICAL
  • Impacted Products: Gardyn IoT Hub
  • Description: The administrative credentials can be extracted through application API responses, mobile application reverse engineering, and device firmware reverse engineering. The exposure may result in an attacker gaining full administrative access to the Gardyn IoT Hub exposing connected devices to malicious control.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-1242
  • PoC:

CVE-2024-4040

  • Severity: 10.0 CRITICAL
  • Impacted Products: CrushFTP versions before 10.7.1 and 11.1.0 across all platforms
  • Description: CVE-2024-4040 is a critical server-side template injection vulnerability in CrushFTP, allowing unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication, and perform remote code execution.
  • Remediation: Update CrushFTP to version 10.7.1 or 11.1.0 to mitigate this vulnerability.
  • More Info: NVD NIST CVE-2024-4040
  • PoC: https://github.com/rbih-boulanouar/CVE-2024-4040/tree/main

CVE-2021-22054 NEW

  • Severity: 7.5 HIGH
  • Impacted Products: VMware Workspace ONE UEM console
  • Description: VMware Workspace ONE UEM console contains a Server Side Request Forgery (SSRF) vulnerability. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.1.
  • Remediation:
  • More Info: NVD - CVE-2021-22054
  • PoC:

CVE-2026-3224 NEW

CVE-2026-20131 NEW

CVE-2026-20079 NEW

CVE-2026-0628

CVE-2026-31816 NEW

  • Severity: 9.1 CRITICAL
  • Impacted Products: Budibase 3.31.4 and earlier
  • Description: Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.4 and earlier, the Budibase server’s authorized() middleware that protects every server-side API endpoint can be completely bypassed by appending a webhook path pattern to the query string of any request. The isWebhookEndpoint() function uses an unanchored regex that tests against ctx.request.url, which in Koa includes the full URL with query parameters. When the regex matches, the authorized() m…
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-31816
  • PoC:

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.