PoC Week 2026-04-06
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. I don’t vouch for any links in this list: follow them with caution.
CVE-2026-34156 NEW
- Severity: 9.9 CRITICAL
- Impacted Products: NocoBase versions prior to 2.0.28
- Description: NocoBase is affected by a sandbox escape vulnerability in its Workflow Script Node that allows authenticated attackers to achieve remote code execution. This flaw occurs because the application improperly exposes host-realm objects within the Node.js sandbox environment.
- Remediation:
- More Info: NVD - CVE-2026-34156
- PoC:
CVE-2026-33937 NEW
- Severity: 9.8 CRITICAL
- Impacted Products: Handlebars
- Description: Handlebars is affected by a template injection vulnerability in the
Handlebars.compile()function that allows for remote code execution. This flaw exists because the application fails to sanitize or quote thevaluefield of aNumberLiteralnode when processing a pre-parsed Abstract Syntax Tree (AST) object. - Remediation:
- More Info: NVD - CVE-2026-33937
- PoC:
CVE-2026-33634 NEW
- Severity: 8.8 HIGH
- Impacted Products: Aqua Security Trivy v0.69.4, aquasecurity/trivy-action (versions 0.0.1 – 0.34.2), aquasecurity/setup-trivy (versions 0.2.0 – 0.2.6)
- Description: Aqua Security Trivy and its associated GitHub Actions were affected by a supply chain compromise where a threat actor published malicious releases containing embedded malware. This incident allowed for the execution of credential-stealing code within environments using the affected software.
- Remediation:
- More Info: NVD - CVE-2026-33634
- PoC:
CVE-2026-33340 NEW
- Severity: 9.1 CRITICAL
- Impacted Products: lollms-webui
- Description: LoLLMs WEBUI provides the Web user interface for Lord of Large Language and Multi modal Systems. A critical Server-Side Request Forgery (SSRF) vulnerability has been identified in all known existing versions of
lollms-webui. The@router.post("/api/proxy")endpoint allows unauthenticated attackers to force the server into making arbitrary GET requests. This can be exploited to access internal services, scan local networks, or exfiltrate sensitive cloud metadata (e.g., AWS/GCP IAM tokens). … - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2026-33340
- PoC:
CVE-2026-33032 NEW
- Severity: 9.8 CRITICAL
- Impacted Products: Nginx UI 2.3.5 and prior
- Description: Nginx UI versions 2.3.5 and prior are affected by a missing authentication vulnerability in the Model Context Protocol (MCP) integration’s ‘/mcp_message’ endpoint. This flaw allows unauthenticated remote attackers to access administrative tools and achieve a complete takeover of the Nginx service.
- Remediation:
- More Info: NVD - CVE-2026-33032
- PoC:
CVE-2026-3055 NEW
- Severity: 9.8 CRITICAL
- Impacted Products: NetScaler ADC, NetScaler Gateway
- Description: NetScaler ADC and NetScaler Gateway are affected by an out-of-bounds read vulnerability when configured as a SAML Identity Provider (IDP). This flaw allows a remote, unauthenticated attacker to access sensitive information stored in the appliance’s memory.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2026-3055
- PoC:
CVE-2026-27876 NEW
- Severity: 9.1 CRITICAL
- Impacted Products: Grafana OSS
- Description: A chained attack via SQL Expressions and a Grafana Enterprise plugin can lead to a remote arbitrary code execution impact (RCE). This is enabled by a feature in Grafana (OSS), so all users are always recommended to update to avoid future attack vectors going this path. Only instances with the sqlExpressions feature toggle enabled are vulnerable.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2026-27876
- PoC:
CVE-2026-26831 NEW
- Severity: 9.8 CRITICAL
- Impacted Products: textract through 2.5.0
- Description: textract through 2.5.0 is vulnerable to OS Command Injection via the file path parameter in multiple extractors. When processing files with malicious filenames, the filePath is passed directly to child_process.exec() in lib/extractors/doc.js, rtf.js, dxf.js, images.js, and lib/util.js with inadequate sanitization
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2026-26831
- PoC:
CVE-2026-22738 NEW
- Severity: 9.8 CRITICAL
- Impacted Products: Spring AI: 1.0.0 before 1.0.5, 1.1.0 before 1.1.4
- Description: In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. Only applications that use SimpleVectorStore and pass user-supplied input as a filter expression key are affected. This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
- Remediation:
- More Info: NVD - CVE-2026-22738
- PoC:
CVE-2026-5281 NEW
- Severity: 8.8 HIGH
- Impacted Products: Google Chrome
- Description: Google Chrome is affected by a use-after-free vulnerability in Dawn, the underlying WebGPU implementation, which could allow for arbitrary code execution. The flaw is triggered when the application attempts to access memory that has already been deallocated.
- Remediation:
- More Info: NVD - CVE-2026-5281
- PoC:
References
This list was scraped from the quite amazing and highly recommended newsletters below:
Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.