PoC Week 2026-04-27

Posted on Apr 27, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. I don’t vouch for any links in this list: follow them with caution.

CVE-2026-32201 NEW

CVE-2026-33824

CVE-2026-40175

CVE-2026-39842 NEW

  • Severity: 9.9 CRITICAL
  • Impacted Products: OpenRemote 1.21.0 and below
  • Description: OpenRemote is an open-source IoT platform. Versions 1.21.0 and below contain two interrelated expression injection vulnerabilities in the rules engine that allow arbitrary code execution on the server. The JavaScript rules engine executes user-supplied scripts via Nashorn’s ScriptEngine.eval() without sandboxing, class filtering, or access restrictions, and the authorization check in RulesResourceImpl only restricts Groovy rules to superusers while leaving JavaScript rules unrestricted for an…
  • Remediation:
  • More Info: NVD - CVE-2026-39842
  • PoC:

CVE-2026-39813 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Fortinet FortiSandbox 4.4.0 through 4.4.8, Fortinet FortiSandbox 5.0.0 through 5.0.5
  • Description: Fortinet FortiSandbox is affected by a path traversal vulnerability in its JRPC API that allows for privilege escalation. This flaw enables unauthenticated attackers to bypass authentication mechanisms using specially crafted HTTP requests.
  • Remediation:
  • More Info: NVD - CVE-2026-39813
  • PoC:

CVE-2026-39808

CVE-2026-35031

CVE-2026-31908 NEW

CVE-2026-20180 NEW

  • Severity: 9.9 CRITICAL
  • Impacted Products: Cisco Identity Services Engine (ISE) versions prior to 3.4.0 Patch 4
  • Description: Cisco Identity Services Engine (ISE) is affected by multiple vulnerabilities, including path traversal, that allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on the underlying operating system. These flaws are caused by insufficient validation of user-supplied input within the application’s administrative interface.
  • Remediation:
  • More Info: NVD - CVE-2026-20180
  • PoC:

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.