PoC Week 2026-04-20

Posted on Apr 20, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. I don’t vouch for any links in this list: follow them with caution.

CVE-2026-5281

CVE-2026-33825 NEW

CVE-2026-33824 NEW

CVE-2026-34621 NEW

CVE-2025-6965 NEW

CVE-2026-4631 NEW

CVE-2026-40175 NEW

CVE-2026-39912 NEW

CVE-2026-39808 NEW

CVE-2026-35031 NEW

CVE-2026-34197 NEW

CVE-2026-33229 NEW

CVE-2026-23696 NEW

  • Severity: 9.9 CRITICAL
  • Impacted Products: Windmill CE 1.276.0 through 1.603.2, Windmill EE 1.276.0 through 1.603.2
  • Description: Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vulnerability in the folder ownership management functionality that allows authenticated attackers to inject SQL through the owner parameter. An attacker can use the injection to read sensitive data such as the JWT signing secret and administrative user identifiers, forge an administrative token, and then execute arbitrary code via the workflow execution endpoints.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-23696
  • PoC:

CVE-2026-22679 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Weaver (Fanwei) E-cology 10.0 versions prior to 20260312
  • Description: Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invoking exposed debug functionality. Attackers can craft POST requests with attacker-controlled interfaceName and methodName parameters to reach command-execution helpers and achieve arbitrary command execution on the system. Exploitation evidence was first…
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-22679
  • PoC:

CVE-2026-0740

  • Severity: 9.8 CRITICAL
  • Impacted Products: Ninja Forms - File Uploads plugin for WordPress 3.3.26, Ninja Forms - File Uploads plugin for WordPress 3.3.25, Ninja Forms - File Uploads plugin for WordPress 3.3.27
  • Description: The Ninja Forms - File Uploads plugin for WordPress is affected by an arbitrary file upload vulnerability that allows unauthenticated attackers to achieve remote code execution. This issue exists in all versions of the plugin up to and including 3.3.26.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-0740
  • PoC:

CVE-2025-44560 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: owntone-server 2ca10d9
  • Description: owntone-server 2ca10d9 is vulnerable to Buffer Overflow due to lack of recursive checking.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-44560
  • PoC:

CVE-2021-4473 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Tianxin Internet Behavior Management System, NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin
  • Description: Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in ver…
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2021-4473
  • PoC:

CVE-2019-25709 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: CF Image Hosting Script 1.6.5
  • Description: CF Image Hosting Script 1.6.5 allows unauthenticated attackers to download and decode the application database by accessing the imgdb.db file in the upload/data directory. Attackers can extract delete IDs stored in plaintext from the deserialized database and use them to delete all pictures via the d parameter.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2019-25709
  • PoC:

CVE-2026-5194 NEW

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.