Skip to content
Threat Feed

Tag

Rce

153 briefs RSS
critical advisory

Arelle Unauthenticated Remote Code Execution Vulnerability

Arelle before 2.39.10 is vulnerable to unauthenticated remote code execution via the /rest/configure REST endpoint, allowing attackers to execute arbitrary Python code by supplying a malicious URL through the plugins parameter.

Arelle rce vulnerability
2r 1t 1c
critical advisory

OpenMRS Module Upload Path Traversal Vulnerability

OpenMRS versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, are vulnerable to a path traversal (Zip Slip) attack via the `POST /openmrs/ws/rest/v1/module` endpoint that allows authenticated attackers to achieve arbitrary file write and remote code execution.

openmrs-web +1 path-traversal zip-slip rce openmrs web-application
2r 1t
critical advisory

NetBox RCE via Jinja2 Template Injection (CVE-2026-29514)

NetBox versions 4.3.5 through 4.5.4 are vulnerable to remote code execution (RCE) via template injection, where authenticated users with specific permissions can inject malicious Python callables into template parameters, bypassing Jinja2 sandboxing to execute arbitrary code.

NetBox rce template-injection cve-2026-29514
2r 1t 1c
critical advisory

OPNsense Multiple Vulnerabilities Leading to Remote Code Execution

A remote, anonymous attacker can exploit multiple vulnerabilities in OPNsense to bypass security measures and execute arbitrary code, potentially leading to complete system compromise.

OPNsense vulnerability rce firewall
2r 1t
critical advisory

Multiple Vulnerabilities in Mozilla Thunderbird Allow for Remote Code Execution and Data Breach

Multiple vulnerabilities in Mozilla Thunderbird prior to versions 150.0.1 and Thunderbird ESR prior to 140.10.1 could allow a remote attacker to achieve arbitrary code execution, data confidentiality breach, and security policy bypass.

Thunderbird ESR +1 vulnerability rce databreach securitybypass
2r 4t 5c
critical advisory

WordPress Widget Options Plugin Remote Code Execution Vulnerability (CVE-2026-2052)

The Widget Options plugin for WordPress is vulnerable to Remote Code Execution (CVE-2026-2052) due to insufficient input sanitization in the Display Logic feature, allowing authenticated attackers with Contributor-level access and above to execute arbitrary code on the server.

The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets plugin <= 4.2.2 wordpress rce plugin
2r 1t 1c
critical advisory

WordPress User Registration Advanced Fields Plugin Arbitrary File Upload Vulnerability

The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, allowing unauthenticated attackers to upload arbitrary files leading to potential remote code execution.

User Registration Advanced Fields plugin <= 1.6.20 wordpress file-upload rce
2r 1t 1c
critical advisory

HKUDS OpenHarness Remote Code Execution via /bridge Slash Command (CVE-2026-7551)

HKUDS OpenHarness contains a remote code execution vulnerability (CVE-2026-7551) in the /bridge slash command, allowing remote attackers to execute arbitrary operating system commands by injecting malicious commands via the /bridge spawn command, leading to unauthorized shell access and data exposure.

OpenHarness rce vulnerability injection
2r 1t 1c
critical advisory

Synway SMG Gateway Management Software Unauthenticated OS Command Injection

Synway SMG Gateway Management Management Software is vulnerable to unauthenticated OS command injection via crafted POST requests to the RADIUS configuration endpoint, leading to remote code execution.

SMG Gateway Management Software command-injection rce network
2r 1t 1c
critical advisory

GIMP Multiple Vulnerabilities Allow Remote Code Execution

A remote, anonymous attacker can exploit multiple unspecified vulnerabilities in GIMP to achieve arbitrary code execution on a vulnerable system.

GIMP vulnerability rce
2r 1t 5c
high advisory

Multiple Vulnerabilities in Wireshark Lead to Remote Code Execution and Denial of Service

Multiple vulnerabilities in Wireshark versions 4.4.x before 4.4.15 and 4.6.x before 4.6.5 could allow remote attackers to execute arbitrary code, cause a denial of service, or compromise data confidentiality.

Wireshark 4.4.x +1 wireshark vulnerability rce dos
2r
critical advisory

n8n XML Node Prototype Pollution Leading to RCE

A vulnerability in n8n allows authenticated users with workflow creation permissions to achieve remote code execution (RCE) through global prototype pollution via the XML Node in versions prior to 1.123.32, versions 2.17.0 to 2.17.4, and versions 2.18.0 to 2.18.1.

n8n rce prototype pollution
3r 1t
critical advisory

n8n Prototype Pollution in XML Webhook Body Parser Leads to RCE

A prototype pollution vulnerability in n8n's XML webhook parser, exploitable by authenticated users, can lead to remote code execution on the n8n host.

n8n prototype-pollution rce
2r 1t
critical advisory

Hyperledger Fabric SDK Java Deserialization RCE

The deprecated fabric-sdk-java client SDK is vulnerable to Java deserialization RCE due to the use of ObjectInputStream.readObject() without an ObjectInputFilter in Channel.java, allowing remote code execution if an attacker can supply crafted serialized Channel bytes to the client application.

fabric-sdk-java deserialization rce java
2r 1t
critical advisory

Cockpit CMS Authenticated Remote Code Execution via Code Injection

Cockpit CMS is vulnerable to authenticated remote code execution via PHP code injection in the /cockpit/collections/save_collection endpoint, enabling attackers with collection management privileges to execute arbitrary commands on the server.

Cockpit CMS rce code-injection cockpit-cms
2r 1t 1c
high advisory

BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution via Arbitrary File Deletion

CVE-2018-25308 is a remote code execution vulnerability in BuddyPress Xprofile Custom Fields Type 2.6.3 that allows authenticated users to delete arbitrary files on the server by manipulating POST parameters.

BuddyPress Xprofile Custom Fields Type rce file-deletion wordpress
2r 1t 1c
critical advisory

AgentFlow Arbitrary Code Execution via Pipeline Path Manipulation (CVE-2026-7466)

AgentFlow is vulnerable to arbitrary code execution (CVE-2026-7466) by manipulating the `pipeline_path` parameter in POST requests to `/api/runs` and `/api/runs/validate`, allowing attackers to execute arbitrary Python code.

AgentFlow cve-2026-7466 rce code-injection
2r 1t 1c
critical advisory

Multiple Vulnerabilities in Spring Boot Allow Authorization Bypass and Potential RCE

Multiple vulnerabilities in Spring Boot, including CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972, can allow attackers to bypass authorization, hijack sessions, or achieve remote code execution, potentially leading to data breaches and system compromise.

Spring Boot spring-boot vulnerability rce authentication-bypass session-hijacking
2r 3t 3c
critical advisory

Apache MINA Arbitrary Code Execution Vulnerability

A critical arbitrary code execution vulnerability (CVE-2026-41635) exists in Apache MINA versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5 due to missing class validation in the AbstractIoBuffer.resolveClass() method, potentially allowing attackers to execute arbitrary code on applications using Apache MINA.

MINA 2.0 +2 apache-mina rce deserialization cve-2026-41635
2r 1t 1c
critical advisory

Linksys MR9600 Command Injection Vulnerability (CVE-2026-6992)

CVE-2026-6992 is a command injection vulnerability in the Linksys MR9600 router that allows remote attackers to execute arbitrary OS commands by manipulating the 'pin' argument in the BTRequestGetSmartConnectStatus function.

MR9600 cve-2026-6992 command-injection router rce
2r 2t 1c
critical threat

Rclone Unauthenticated Remote Code Execution Vulnerabilities

Rclone versions prior to 1.73.5 are vulnerable to two critical unauthenticated remote code execution vulnerabilities (CVE-2026-41176 and CVE-2026-41179) when the remote control API is enabled without authentication, potentially allowing attackers to execute arbitrary commands and compromise the system.

exploited Rclone vulnerability rce cloud
2r 2t 2c
critical advisory

ERB Deserialization Bypass via def_module/def_method/def_class

A deserialization vulnerability exists in Ruby ERB versions before 4.0.3.1, version 4.0.4, ERB versions 5.0.0 before 6.0.1.1, and ERB versions 6.0.2 before 6.0.4. The `@_init` instance variable guard in `ERB#result` and `ERB#run` can be bypassed via `ERB#def_module`, `ERB#def_method`, and `ERB#def_class`, allowing arbitrary code execution when an ERB object is reconstructed via `Marshal.load` on untrusted data.

ERB deserialization rce ruby rails
2r 2t 1c
critical advisory

Gemini CLI Remote Code Execution via Workspace Trust and Tool Allowlisting Bypasses

Gemini CLI is vulnerable to remote code execution via workspace trust and tool allowlisting bypasses, impacting headless mode and GitHub Actions workflows.

Gemini CLI +1 rce supply-chain github-actions
2r 1t
critical advisory

BridgeHead FileStore Unauthenticated Remote Code Execution via Apache Axis2

BridgeHead FileStore versions prior to 24A are vulnerable to unauthenticated remote code execution via exposed Apache Axis2 administration module with default credentials, enabling attackers to upload malicious web services and execute arbitrary OS commands.

FileStore +1 rce cve-2026-39920 apache axis2 default credentials web service
2r 2t 1c
high advisory

OpenShell Arbitrary Code Execution Vulnerability (CVE-2026-41355)

OpenShell before 2026.3.28 is vulnerable to arbitrary code execution via mirror mode when converting untrusted sandbox files into workspace hooks, allowing attackers with mirror mode access to execute code during gateway startup.

OpenShell cve rce
2r 2t 1c
critical advisory

OpenClaw Remote Code Execution via Node Scope Gate Bypass (CVE-2026-41352)

OpenClaw before 2026.3.31 is vulnerable to remote code execution (CVE-2026-41352) because a device-paired node can bypass the node scope gate authentication mechanism, allowing attackers with device pairing credentials to execute arbitrary node commands.

OpenClaw rce vulnerability cve-2026-41352
2r 1t 1c
critical advisory

Marimo Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39987)

CVE-2026-39987 is a pre-authentication remote code execution vulnerability in Marimo, enabling unauthenticated attackers to execute arbitrary system commands.

Marimo CVE-2026-39987 rce vulnerability
2r 1t 1c
critical advisory

Apache ActiveMQ Vulnerabilities Allow RCE and XSS

An authenticated remote attacker can exploit multiple vulnerabilities in Apache ActiveMQ to execute arbitrary program code or perform cross-site scripting attacks.

ActiveMQ rce xss apache
2r 1t 5c
critical advisory

Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution

Multiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.

ASA +4 cisco vulnerability rce authentication-bypass
2r 4t 3c
critical advisory

Xerte Online Toolkits Unauthenticated Remote Code Execution via File Upload

Xerte Online Toolkits 3.15 and earlier contain an incomplete input validation vulnerability allowing unauthenticated attackers to upload malicious PHP code with a '.php4' extension, leading to arbitrary operating system command execution on the server.

Online Toolkits cve-2026-34415 rce file-upload web-application
2r 3t 1c
critical advisory

Mirai Campaign Exploiting CVE-2025-29635 in D-Link Routers

A new Mirai-based malware campaign is exploiting CVE-2025-29635, a command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.

DIR-823X +1 mirai ddos rce iot
2r 4t 2c
critical advisory

Multiple Vulnerabilities in n8n Workflow Automation Tool

Multiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose sensitive information, conduct SQL injection attacks, cause denial-of-service, perform cross-site scripting, redirect users, or hijack sessions.

n8n vulnerability sqli xss rce session-hijacking
3r 5t 1c
critical advisory

IBM Total Storage Service Console (TSSC) / TS4500 IMC Unauthenticated Remote Command Execution

An unauthenticated user can execute arbitrary commands with normal user privileges on vulnerable IBM Total Storage Service Console (TSSC) / TS4500 IMC versions due to improper validation of user-supplied input, as identified by CVE-2026-5935.

Total Storage Service Console +1 cve-2026-5935 rce command injection
2r 1t 1c
critical advisory

CI4MS Backup Restore Zip Slip Vulnerability Leads to RCE

The CI4MS Backup restore function is vulnerable to Zip Slip, allowing remote code execution by uploading a malicious ZIP archive that writes PHP files to the public web root due to missing validation of entry names during extraction, affecting versions prior to 0.31.5.0.

ci4-cms-erp/ci4ms zip-slip rce code-injection vulnerability
2r 2t
critical advisory

Critical RCE Vulnerabilities in Spinnaker

Critical vulnerabilities CVE-2026-32613 and CVE-2026-32604 in Spinnaker allow authenticated attackers to execute arbitrary code due to insufficient input validation in expression parsing and gitrepo artifact handling, potentially leading to complete system compromise.

Spinnaker rce vulnerability
2r 1t 2c
critical advisory

WordPress HTTP Headers Plugin Remote Code Execution via File Path Manipulation (CVE-2026-4132)

The HTTP Headers WordPress plugin is vulnerable to remote code execution (RCE) due to insufficient validation of the htpasswd file path and lack of sanitization of the username, allowing authenticated administrators to write arbitrary code to the server.

wordpress rce plugin cve-2026-4132
2r 1t 1c
critical advisory

Insecure Deserialization Vulnerability in Telerik UI for AJAX RadFilter Control (CVE-2026-6023)

An insecure deserialization vulnerability exists in Progress Telerik UI for AJAX's RadFilter control (versions 2024.4.1114 through 2026.1.421) allowing remote code execution via tampering with the filter state exposed to the client.

cve-2026-6023 telerik deserialization rce webserver
2r 1t 1c
critical advisory

WWBN AVideo Unauthenticated Remote Code Execution via test.php

WWBN AVideo versions up to 29.0 contain an OS Command Injection vulnerability (CVE-2026-41064) in the `test.php` file, allowing unauthenticated remote code execution due to insufficient input sanitization, especially affecting `file_get_contents` and `curl` code paths.

cve-2026-41064 avideo rce command-injection
2r 2t 1c 1i
critical advisory

Vvveb CMS 1.0.8 Remote Code Execution via Malicious Upload

Vvveb CMS 1.0.8 is vulnerable to remote code execution, allowing authenticated attackers to upload a PHP webshell with a .phtml extension, bypass extension restrictions, and execute arbitrary operating system commands by requesting the uploaded file.

cve-2026-6249 rce web-application
2r 1t 1c
critical advisory

Dolibarr OS Command Injection via MAIN_ODT_AS_PDF Configuration

Dolibarr versions 22.0.4 and earlier are vulnerable to OS Command Injection via the MAIN_ODT_AS_PDF configuration, allowing an authenticated administrator to inject a malicious payload, leading to arbitrary operating system command execution.

command-injection rce dolibarr
2r 1t 1c
critical advisory

Anviz CX2 Lite and CX7 Unauthenticated Remote Code Execution via Unverified Update Packages (CVE-2026-40066)

Anviz CX2 Lite and CX7 devices are vulnerable to unverified update packages that allow for unauthenticated remote code execution by unpacking and executing a malicious script.

cve-2026-40066 rce iot
2r 1t 1c
critical advisory

WP Customer Area Plugin Arbitrary File Read and Deletion Vulnerability

The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation, allowing authenticated attackers to read sensitive files or delete critical files leading to potential remote code execution.

wordpress plugin file-read file-deletion rce
2r 1t 1c
critical advisory

FlowiseAI File Upload Validation Bypass Leads to RCE

A file upload validation bypass vulnerability exists in FlowiseAI, where the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type, enabling an attacker to upload .js files, store malicious Node.js web shells on the server, and potentially achieve Remote Code Execution (RCE).

flowiseai file-upload rce web-shell
2r 2t 1c
critical threat

Sagredo qmail Remote Code Execution Vulnerability (CVE-2026-41113)

A remote code execution vulnerability exists in Sagredo qmail versions prior to 2026.04.07 due to the use of `popen` in the `notlshosts_auto` function within `qmail-remote.c`, potentially leading to OS command injection.

exploited qmail rce command-injection CVE-2026-41113
2r 3t 1c 1i
critical advisory

Flowise Authenticated Remote Code Execution via MCP Adapter

Flowise versions 3.0.13 and earlier are vulnerable to authenticated arbitrary command execution due to unsafe serialization of stdio commands in the MCP adapter, allowing a malicious user to execute commands on the underlying operating system.

flowise rce command-injection
3r 1t
critical advisory

Multiple Critical Vulnerabilities in CISCO ISE Leading to Remote Code Execution

Multiple critical vulnerabilities in CISCO ISE (CVE-2026-20186, CVE-2026-20147, CVE-2026-20180) allow remote attackers with low privileges to execute arbitrary commands, potentially escalating privileges to root and causing denial-of-service.

cisco-ise rce command-injection path-traversal
2r 3t 3c
critical advisory

JetBrains YouTrack RCE via Sandbox Bypass (CVE-2026-33392)

A high privileged user can achieve remote code execution via sandbox bypass in JetBrains YouTrack before version 2025.3.131383, identified as CVE-2026-33392, potentially leading to complete system compromise.

cve-2026-33392 rce jetbrains youtrack sandbox-bypass
2r 1t 1c
critical advisory

FlowiseAI AirtableAgent Remote Code Execution via Prompt Injection

A remote code execution vulnerability exists in FlowiseAI's AirtableAgent.ts due to insufficient input verification when using Pandas, allowing attackers to inject malicious code into the prompt and execute arbitrary code via Pyodide.

flowiseai rce prompt-injection airtable
2r 1t
critical advisory

Apache ActiveMQ Multiple Vulnerabilities Allow Remote Code Execution

An authenticated remote attacker can exploit multiple vulnerabilities in Apache ActiveMQ to manipulate files or execute arbitrary code.

apache-activemq vulnerability rce
2r 1t
high advisory

Weblate Project Backup Vulnerability Leads to Potential Remote Code Execution (CVE-2026-33435)

Weblate versions before 5.17 are susceptible to remote code execution due to unfiltered Git and Mercurial configuration files in project backups, potentially allowing attackers to execute arbitrary code under specific conditions.

cve-2026-33435 rce weblate
2r 3t 1c
critical advisory

SQL Server Untrusted Pointer Dereference Vulnerability (CVE-2026-33120)

CVE-2026-33120 is an untrusted pointer dereference vulnerability in Microsoft SQL Server that allows an authenticated attacker to achieve remote code execution over a network.

sql-server rce vulnerability
2r 1t 1c 2i
critical advisory

Critical Remote Code Execution Vulnerability in Talend JobServer and Talend Runtime

CVE-2026-6264, a critical deserialization vulnerability in Talend JobServer and Runtime, allows unauthenticated remote code execution via the JMX monitoring port, leading to complete system compromise.

rce deserialization talend
2r 2t 1c
critical advisory

Adobe ColdFusion Improper Input Validation RCE

Adobe ColdFusion versions 2023.18, 2025.6, and earlier are vulnerable to improper input validation, potentially leading to arbitrary code execution without user interaction.

cve-2026-27304 coldfusion rce improper-input-validation
2r 1t 1c 1i
critical advisory

UniFi Play Path Traversal Vulnerability (CVE-2026-22562)

A path traversal vulnerability in UniFi Play devices allows an attacker with network access to write arbitrary files, leading to remote code execution.

path-traversal rce unifi
2r 2t 1c
critical threat

NocoBase plugin-workflow-javascript Sandbox Escape Vulnerability

A remote code execution vulnerability exists in NocoBase plugin-workflow-javascript versions up to 2.0.23 due to a sandbox escape in the createSafeConsole function, allowing unauthenticated attackers to potentially execute arbitrary code on the server.

exploited nocobase rce sandbox-escape cve-2026-6224
2r 1t 1c
high advisory

Smart Post Show WordPress Plugin PHP Object Injection Vulnerability

The Smart Post Show WordPress plugin versions 3.0.12 and earlier are vulnerable to PHP Object Injection via deserialization of untrusted input in the import_shortcodes() function, potentially leading to remote code execution if a suitable POP chain is present.

wordpress php object-injection rce
2r 1t 1c
critical threat

Adobe Acrobat and Reader CVE-2026-34621 Zero-Day Exploitation

Adobe patched CVE-2026-34621, a zero-day vulnerability in Acrobat and Reader exploited since December, allowing malicious PDFs to bypass sandboxes and execute arbitrary code, potentially leading to local file theft.

exploited adobe acrobat reader rce vulnerability
2r 2t 1c 1i
high advisory

Math.js Improperly Controlled Modification of Object Attributes Leads to RCE

A vulnerability in math.js versions before 15.2.0 allows for arbitrary JavaScript execution through the expression parser when evaluating user-supplied expressions.

mathjs rce expression-injection
2r 1t
critical advisory

LiteLLM Remote Code Execution via Bytecode Rewriting (CVE-2026-40217)

LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI, potentially leading to complete system compromise.

CVE-2026-40217 litellm rce bytecode-rewriting
2r 1t 1c
critical advisory

Chamilo LMS Unauthenticated Remote Code Execution via Configuration Injection (CVE-2026-33618)

Chamilo LMS versions prior to 2.0.0-RC.3 are vulnerable to remote code execution (RCE) via eval injection, where an authenticated administrator can inject arbitrary PHP code into platform settings that is then executed when any user (including unauthenticated) requests the /platform-config/list endpoint.

chamilo rce eval-injection cve-2026-33618
2r 1t 1c
critical advisory

PraisonAI Remote Code Execution via Malicious Workflow YAML

PraisonAI is vulnerable to remote code execution; loading untrusted YAML files with `type: job` can lead to arbitrary host command execution, potentially enabling full system compromise.

praisonai rce yaml
2r 1t 2i
critical advisory

PraisonAI UI Hardcoded Approval Mode Leads to Remote Code Execution

A vulnerability in PraisonAI allows authenticated users to execute arbitrary shell commands due to a hardcoded approval setting in the Chainlit UI modules, overriding administrator configurations and bypassing intended approval gates; insufficient command sanitization allows for destructive command execution, leading to confidentiality breach, integrity compromise, and availability impact on the server.

rce command-injection praisonai
2r 3t
critical advisory

OpenClaw WebView JavascriptInterface Vulnerability (CVE-2026-35643)

OpenClaw before 2026.3.22 is vulnerable to arbitrary code execution due to an unvalidated WebView JavascriptInterface, allowing attackers to inject malicious instructions by invoking the canvas bridge from untrusted pages.

cve-2026-35643 rce android
2r 1t 1c
critical threat

Tenda F451 Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability in the Tenda F451 router (version 1.0.0.7) allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the fromRouteStatic function of the /goform/RouteStatic file.

exploited tenda router buffer_overflow rce
2r 3t 1c
high advisory

OpenClaw RCE via Build Tool Environment Variable Injection

OpenClaw versions prior to 2026.4.8 are vulnerable to remote code execution (RCE) via build tool environment variable injection due to missing denylist entries for HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS, allowing hostile environment variables to influence host exec commands.

rce environment-variable-injection openclaw
2r 2t
high advisory

WAGO PLC OpenVPN Configuration Vulnerability (CVE-2024-1490)

An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC to achieve arbitrary command execution on the device.

cve-2024-1490 wago-plc openvpn rce code-injection
2r 1t 1c 2i
critical advisory

PraisonAI Vulnerable to OS Command Injection

PraisonAI is vulnerable to OS command injection due to the use of `subprocess.run()` with `shell=True` on user-controlled inputs, allowing attackers to inject arbitrary shell commands and potentially leading to sensitive data exfiltration or system compromise in versions prior to 4.5.121.

command-injection rce praisonai
2r 1t 1i
critical advisory

Red Hat Quay Deserialization Vulnerability Leads to Remote Code Execution (CVE-2026-32590)

CVE-2026-32590 describes a deserialization vulnerability in Red Hat Quay's handling of resumable container image layer uploads, potentially allowing an attacker to execute arbitrary code on the Quay server by tampering with intermediate data stored in the database.

cve-2026-32590 redhat-quay deserialization rce
2r 2t 1c
high advisory

XWiki Remote Code Execution via Unprotected Velocity Scripting API

XWiki is vulnerable to remote code execution due to an improperly protected scripting API, allowing users with script rights to bypass the Velocity scripting API sandbox and execute arbitrary code, leading to full instance compromise.

xwiki rce velocity scripting CVE-2026-33229
2r 2t
critical advisory

Apache ActiveMQ Classic RCE via Jolokia API Exploitation

A remote code execution vulnerability (CVE-2026-34197) in Apache ActiveMQ Classic allows authenticated attackers to invoke management operations through the Jolokia API to retrieve a remote configuration file and execute OS commands, potentially exploitable without authentication via CVE-2024-32114.

activemq rce jolokia cve-2026-34197 cve-2024-32114 cve-2022-41678 spring-xml
2r 3t 3c
critical advisory

Everest Forms WordPress Plugin PHP Object Injection Vulnerability

The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection (CVE-2026-3296) in versions up to 3.4.3, allowing unauthenticated attackers to execute arbitrary code by injecting serialized PHP objects via form fields.

wordpress php object-injection rce cve-2026-3296
2r 2t 1c
critical advisory

IBM Langflow Desktop Deserialization RCE (CVE-2026-3357)

IBM Langflow Desktop versions 1.6.0 through 1.8.2 is vulnerable to arbitrary code execution due to insecure deserialization of untrusted data, allowing an authenticated user to execute code on the system.

cve-2026-3357 deserialization rce langflow
2r 1t 1c
high advisory

NI LabVIEW Memory Corruption Vulnerability (CVE-2026-32862)

A memory corruption vulnerability (CVE-2026-32862) in NI LabVIEW versions 2026 Q1 (26.1.0) and prior, stemming from an out-of-bounds write in ResFileFactory::InitResourceMgr(), can lead to information disclosure or arbitrary code execution if a user opens a malicious VI file.

cve-2026-32862 ni-labview memory-corruption rce
2r 5t 1c
critical advisory

ChurchCRM Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39337)

A critical pre-authentication remote code execution vulnerability in ChurchCRM versions prior to 7.1.0 allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise.

rce cve-2026-39337 churchcrm
2r 2t 2c
critical advisory

ChurchCRM Path Traversal Vulnerability Leading to Remote Code Execution

A path traversal vulnerability in ChurchCRM versions prior to 6.5.3 allows authenticated administrators to upload arbitrary files, leading to remote code execution by overwriting Apache .htaccess files.

path-traversal rce churchcrm
2r 1t 1c
critical advisory

Windmill CE/EE SQL Injection Vulnerability

Windmill CE/EE versions 1.276.0 through 1.603.2 are vulnerable to SQL injection in the folder ownership management, allowing authenticated attackers to inject SQL through the owner parameter, leading to sensitive data access, token forgery, and arbitrary code execution.

sql-injection rce windmill
2r 3t 1c
critical threat

Fortinet FortiClient EMS Unauthenticated Remote Code Execution via CVE-2026-35616

A critical vulnerability, CVE-2026-35616, exists in Fortinet FortiClient EMS (Endpoint Management Server) allowing unauthenticated attackers to bypass API authentication and authorization checks to execute arbitrary code or commands, potentially leading to full compromise of the EMS infrastructure.

exploited fortinet forticlient ems rce cve-2026-35616
2r 2t 1c
critical advisory

Weaver E-cology Unauthenticated RCE via Dubbo API Debug Endpoint

Weaver E-cology 10.0 before 20260312 is vulnerable to unauthenticated remote code execution, allowing attackers to execute arbitrary commands by crafting a POST request to the /papi/esearch/data/devops/dubboApi/debug/method endpoint.

weaver e-cology rce unauthenticated cve-2026-22679
3r 1t 1c
critical advisory

Remote Code Execution Vulnerability in JP1/IT Desktop Management Products (CVE-2025-65115)

CVE-2025-65115 is a remote code execution vulnerability affecting multiple versions of JP1/IT Desktop Management and related products on Windows, potentially allowing attackers to execute arbitrary code on vulnerable systems.

cve-2025-65115 rce jp1 windows
2r 1t 1c
critical advisory

Ninja Forms File Upload Plugin Vulnerability Leads to RCE

The Ninja Forms File Uploads plugin for WordPress is vulnerable to unauthenticated arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.

wordpress file-upload rce CVE-2026-0740
2r 2t 1c
critical advisory

AWS Research and Engineering Studio (RES) RCE via FileBrowser API Vulnerability

CVE-2026-5709 is a critical vulnerability in AWS Research and Engineering Studio (RES) versions 2024.10 through 2025.12.01, allowing remote authenticated attackers to execute arbitrary commands on the cluster-manager EC2 instance through the FileBrowser API.

cve-2026-5709 rce aws res
2r 1t 1c
critical advisory

Brave CMS Unrestricted File Upload Leads to Remote Code Execution

Brave CMS versions prior to 2.0.6 contain an unrestricted file upload vulnerability within the CKEditor upload functionality in the ckupload method, allowing authenticated users to upload executable PHP scripts and achieve Remote Code Execution.

cve-2026-35164 rce file-upload brave-cms ckeditor php webserver
2r 3t 1c
critical advisory

GLPI Template Injection RCE (CVE-2026-26026)

GLPI versions 11.0.0 to before 11.0.6 are vulnerable to remote code execution (RCE) via template injection by an authenticated administrator, allowing for arbitrary code execution on the server.

cve-2026-26026 template-injection rce glpi
2r 3t 1c 1i
critical advisory

VA MAX 8.3.4 Remote Code Execution via changeip.php (CVE-2019-25671)

VA MAX 8.3.4 is vulnerable to remote code execution (CVE-2019-25671), allowing authenticated attackers to execute arbitrary commands by injecting shell metacharacters into the mtu_eth0 parameter via a POST request to changeip.php.

rce cve-2019-25671 web-application
2r 1t 1c 2i
high advisory

Budibase Command Injection Vulnerability in Bash Automation Step

A command injection vulnerability exists in Budibase's bash automation step due to insufficient sanitization, allowing attackers with automation modification access to inject arbitrary shell commands, leading to remote code execution.

command-injection rce budibase
2r 1t
critical advisory

pyLoad Arbitrary Code Execution via Malicious Session Deserialization

pyLoad is vulnerable to arbitrary code execution via an unprotected `storage_folder` configuration option, allowing an attacker with `SETTINGS` and `ADD` permissions to write a malicious pickle payload to the Flask session store and execute arbitrary code upon subsequent HTTP requests.

pyLoad rce pickle deserialization webserver
2r 4t 1c 2i
critical advisory

Budibase Unauthenticated Remote Code Execution via Webhook

Budibase versions before 3.33.4 are susceptible to unauthenticated remote code execution, where a threat actor can trigger a Bash step within an automation via the public webhook endpoint, leading to code execution as root within the container.

CVE-2026-35216 budibase rce webhook
2r 1t 1c
critical advisory

Endian Firewall Command Injection Vulnerability (CVE-2026-34791)

Endian Firewall version 3.3.25 and prior allows authenticated users to execute arbitrary OS commands due to an OS command injection vulnerability in the DATE parameter of the /cgi-bin/logs_proxy.cgi endpoint.

command-injection rce vulnerability
2r 1t 1c
critical advisory

ShareFile Storage Zones Controller Unauthenticated Remote Code Execution via File Upload (CVE-2026-2701)

Authenticated users can upload malicious files to a ShareFile Storage Zones Controller server and execute them, leading to remote code execution, due to improper neutralization of special elements, code generation, and unrestricted file upload.

rce file-upload sharefile
2r 1t
critical advisory

ShareFile Storage Zones Controller Unauthenticated Configuration Access and Potential RCE (CVE-2026-2699)

An unauthenticated attacker can access restricted configuration pages in Customer Managed ShareFile Storage Zones Controller (SZC), leading to system configuration changes and potential remote code execution.

sharefile storage-zones-controller rce cve-2026-2699
2r 2t 3i
high advisory

CVE-2026-33613: Remote Code Execution in generateSrpArray Function

CVE-2026-33613 describes a remote code execution (RCE) vulnerability due to improper neutralization of special elements used in an OS command in the generateSrpArray function, leading to full system compromise, but requires a separate method for writing arbitrary data to the user table.

cve-2026-33613 rce command-injection
2r 1t 1c
critical advisory

MW WP Form WordPress Plugin Arbitrary File Move Vulnerability (CVE-2026-4347)

The MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation, allowing unauthenticated attackers to move arbitrary files on the server, potentially leading to remote code execution.

wordpress file-move rce
2r 2t 1c
high advisory

IBM Verify Identity Access and Security Verify Access Command Injection Vulnerability

Unauthenticated command execution is possible in IBM Verify Identity Access Container and IBM Security Verify Access Container due to improper validation of user-supplied input, allowing arbitrary command execution with lower privileges.

command-injection rce cve-2026-1345
2r 1t 1c
critical advisory

Cisco Smart Software Manager On-Prem RCE via Exposed API (CVE-2026-20160)

CVE-2026-20160 is a critical vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) that allows an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system with root privileges by sending a crafted request to an exposed API.

cve-2026-20160 cisco ssm-on-prem rce webserver
2r 1t 1c
high threat

Potential JAVA/JNDI Exploitation Attempt

This rule detects a potential JAVA/JNDI exploitation attempt by identifying outbound network connections by JAVA to LDAP, RMI, or DNS standard ports followed by suspicious JAVA child processes such as shell interpreters and scripting languages, which may indicate a Java Naming and Directory Interface (JNDI) injection vulnerability exploitation attempt.

exploited jndi java log4shell rce exploitation
2r 5t 1c
critical threat

F5 BIG-IP APM CVE-2025-53521 Reclassified as Actively Exploited Unauthenticated RCE

F5 has reclassified CVE-2025-53521, a vulnerability in BIG-IP APM, as a critical unauthenticated remote code execution vulnerability and reports it is being actively exploited in the wild.

exploited f5 big-ip apm cve-2025-53521 rce vulnerability
2r 1t 1c
critical advisory

CrewAI Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities in CrewAI, an open-source multi-agent orchestration framework, can be exploited by attackers through prompt injection to execute arbitrary code and perform other malicious activities, potentially leading to system compromise.

ai rce prompt-injection
3r 3t 4c
critical advisory

XenForo RCE via Authenticated Admin User (CVE-2026-35056)

XenForo before 2.3.9 and 2.2.18 allows remote code execution by authenticated, malicious admin users with admin panel access.

rce xenforo cve-2026-35056 code-injection
2r 1t 1c 1i
critical advisory

SiYuan Knowledge Management System RCE via Malicious Website

SiYuan versions prior to 3.6.2 are vulnerable to remote code execution (RCE) via a malicious website exploiting a permissive CORS policy to inject a JavaScript snippet, leading to arbitrary code execution within the application's Node.js context.

cve-2026-34449 rce siyuan cors
2r 1t 1c
critical advisory

Vim and Emacs Remote Code Execution Vulnerabilities Triggered by File Opening

Vulnerabilities in Vim (<=9.2.0271) and GNU Emacs allow remote code execution by opening a specially crafted file, leveraging flaws in modeline handling and Git integration, respectively.

rce vim emacs git modeline
2r 1t
critical advisory

lodash _.template Function Injection Vulnerability (CVE-2026-4800)

CVE-2026-4800 allows attackers to inject arbitrary code at template compilation time via untrusted input passed as key names in the options.imports object of the _.template function in lodash versions prior to 4.18.0, potentially leading to remote code execution.

lodash template-injection rce cve-2026-4800
2r 2t 2c
critical advisory

act Project Cache Poisoning Vulnerability Leads to Potential RCE

A vulnerability in versions prior to 0.2.86 of the act project allows remote attackers to create arbitrary caches, potentially leading to remote code execution within Docker containers by poisoning predicted cache keys.

act cache-poisoning rce github-actions linux
2r 1t 1c
critical advisory

baserCMS Pre-Auth Arbitrary Code Execution via Zip Upload (CVE-2025-32957)

baserCMS versions prior to 5.2.3 are vulnerable to arbitrary code execution via a crafted zip file upload through the restore function, leading to unauthenticated remote command execution on the webserver.

basercms rce cve-2025-32957 webserver
2r 6t 1c 4i
critical advisory

Contact Form by Supsystic WordPress Plugin SSTI Vulnerability (CVE-2026-4257)

The Contact Form by Supsystic WordPress plugin is vulnerable to Server-Side Template Injection (SSTI) via the `cfsPreFill` parameter, leading to unauthenticated Remote Code Execution (RCE).

ssti wordpress rce twig
2r 1t 1c
critical advisory

Giskard-agents ChatWorkflow.chat() Server-Side Template Injection

Giskard-agents versions 0.3.3 and earlier, and versions 1.0.1a1 through 1.0.2a1 are vulnerable to remote code execution via server-side template injection where the ChatWorkflow.chat() method passes user-supplied strings directly to a non-sandboxed Jinja2 Environment, allowing attackers to execute arbitrary code on the server.

ssti jinja2 rce giskard-agents vulnerability
2r 1t
critical advisory

Grafana Enterprise Plugin SQL Expression RCE via CVE-2026-27876

A chained attack leveraging SQL Expressions and a Grafana Enterprise plugin, tracked as CVE-2026-27876, can lead to remote arbitrary code execution on vulnerable Grafana instances with the sqlExpressions feature enabled.

grafana rce sqlexpression
2r 2t 2i
high advisory

OpenClaw Symlink Traversal via IDENTITY.md appendFile in agents.create/update

OpenClaw is vulnerable to symlink traversal via IDENTITY.md appendFile in agents.create/update. An attacker who can place a symlink in the agent workspace can hijack the IDENTITY.md path to append attacker-controlled content to arbitrary files on the system leading to remote code execution, persistent code execution, unauthorized SSH access, or service disruption.

openclaw symlink-traversal vulnerability npm rce persistence
2r 2t
critical advisory

Critical Vulnerabilities in n8n Workflow Automation Tool

Multiple critical vulnerabilities in n8n, including prototype pollution, code injection, and SQL injection, allow authenticated users to achieve remote code execution, read sensitive files, and perform unauthorized database operations.

n8n vulnerability rce sqli code-injection
3r 2t
critical advisory

vLLM Remote Code Execution Vulnerability (CVE-2026-27893)

vLLM versions before 0.18.0 are vulnerable to remote code execution due to hardcoded trust of remote code, even when explicitly disabled by the user, allowing attackers to execute arbitrary code via malicious model repositories.

vLLM RCE CVE-2026-27893
2r 1t 1i
critical advisory

Ruckus Unleashed Authenticated Remote Code Execution via CVE-2023-7338

CVE-2023-7338 is a remote code execution vulnerability affecting Ruckus Unleashed when gateway mode is enabled, allowing authenticated remote attackers to execute arbitrary code by sending specially crafted requests through the web-based management interface.

CVE-2023-7338 ruckus rce os command injection
2r 3t 2i
critical advisory

n8n Prototype Pollution Vulnerability Leads to Remote Code Execution

A prototype pollution vulnerability in the n8n GSuiteAdmin node allows authenticated users with workflow creation/modification permissions to achieve remote code execution (RCE) by injecting attacker-controlled values into `Object.prototype`.

n8n prototype-pollution rce
2r 1t
critical advisory

EVerest EV Charging Stack Remote Code Execution via Stack Buffer Overflow (CVE-2026-22790)

EVerest versions before 2026.02.0 are vulnerable to a stack-based buffer overflow (CVE-2026-22790) in the `HomeplugMessage::setup_payload` function, enabling remote code execution via network frames with oversized SLAC payloads.

everest rce buffer-overflow cve-2026-22790
2r 1t 1i
critical advisory

Foreman WebSocket Proxy Command Injection Vulnerability (CVE-2026-1961)

A command injection vulnerability exists in Foreman's WebSocket proxy, enabling remote code execution on the Foreman server via a malicious compute resource server when a user accesses VM VNC console functionality.

command-injection rce foreman
2r 1t
critical advisory

n8n Merge Node AlaSQL Injection Vulnerability

An authenticated user with workflow creation/modification permissions can exploit insufficient restrictions in the n8n Merge node's AlaSQL sandbox to achieve remote code execution by reading local files or executing commands on the n8n host.

n8n rce alaqsl injection
2r 1t
critical advisory

Netcore Power 15AX Remote Command Execution Vulnerability

CVE-2026-4840 is a critical command injection vulnerability in the Netcore Power 15AX router that allows remote attackers to execute arbitrary OS commands by manipulating the IpAddr argument in the setTools function of the /bin/netis.cgi file.

command-injection rce vulnerability netcore router
2r 1t
high advisory

Sharp Laravel Admin Panel Unrestricted File Upload Vulnerability

The code16/sharp Laravel admin panel package contains a vulnerability in its file upload endpoint that allows authenticated users to bypass all file type restrictions by manipulating the validation_rule parameter, potentially leading to Remote Code Execution (RCE) if the storage disk is configured to be publicly accessible.

laravel file-upload rce code16/sharp
2r 1t 5i
critical advisory

CVE-2026-4729 Memory Safety Vulnerabilities in Firefox and Thunderbird

Firefox 148 and Thunderbird 148 contain memory safety bugs that could potentially be exploited to execute arbitrary code, impacting versions prior to 149.

cve-2026-4729 memory-corruption firefox thunderbird rce
2r 8t 1i
critical advisory

Critical Unauthenticated RCE Vulnerability Exploited in Microsoft SharePoint

A remote code execution vulnerability in Microsoft SharePoint (CVE not specified) is being actively exploited by unauthenticated attackers, prompting urgent patching recommendations for internet-facing servers.

sharepoint rce vulnerability
2r 2t
high advisory

Craft CMS Authenticated Remote Code Execution via Malicious Attached Behavior

A remote code execution vulnerability exists in Craft CMS versions 5.6.0 through 5.9.12, where any authenticated user with control panel access can exploit the vulnerability by injecting malicious behavior via the `fieldLayouts` parameter in `ElementIndexesController::actionFilterHud()` due to the unsanitized parameter being passed to `FieldLayout::createFromConfig()`.

craftcms rce vulnerability webserver
2r 1t
critical advisory

Firefox and Thunderbird JIT Miscompilation Vulnerability (CVE-2026-4698)

A critical JIT miscompilation vulnerability (CVE-2026-4698) in the JavaScript engine affects Firefox and Thunderbird, potentially leading to remote code execution.

firefox thunderbird jit miscompilation rce cve-2026-4698 type-confusion
2r 5t
critical advisory

PhreeBooks ERP 5.2.3 Remote Code Execution Vulnerability

PhreeBooks ERP 5.2.3 is vulnerable to remote code execution, allowing authenticated attackers to upload and execute arbitrary PHP files via the image manager, leading to reverse shell connections and system command execution.

rce vulnerability php
2r 3t
critical advisory

PhreeBooks ERP 5.2.3 Arbitrary File Upload Vulnerability

PhreeBooks ERP 5.2.3 is vulnerable to arbitrary file upload in the Image Manager component, allowing authenticated attackers to upload malicious PHP files leading to remote code execution.

phreebooks file-upload rce
2r 2t
critical advisory

TOTOLINK X6000R Remote Command Injection Vulnerability

A remote command injection vulnerability exists in TOTOLINK X6000R routers, specifically versions 9.4.0cu.1360_B20241207 and 9.4.0cu.1498_B20250826, allowing attackers to execute arbitrary commands via manipulation of the Hostname argument in the setLanCfg function.

totolink rce command-injection cve-2026-4611
2r 1t
critical advisory

ReviewX WordPress Plugin Arbitrary Method Call Vulnerability

The ReviewX WordPress plugin is vulnerable to arbitrary method calls, allowing unauthenticated attackers to potentially achieve remote code execution.

wordpress woocommerce reviewx rce vulnerability
2r 1t
critical advisory

Oracle Fusion Middleware RCE Vulnerability (CVE-2026-21992)

CVE-2026-21992 allows an unauthenticated attacker to gain network access via HTTP and execute code remotely on Oracle Identity Manager and Oracle Web Services Manager.

vulnerability rce oracle
2r 2t
critical advisory

Critical RCE Vulnerability in Langflow AI Pipelines (CVE-2026-33017)

A critical remote code execution vulnerability, CVE-2026-33017, exists in Langflow AI pipelines prior to version 1.9.0 that allows an unauthenticated remote attacker to execute code with full server process privileges, impacting availability, integrity, and confidentiality.

langflow rce cve-2026-33017 ai-pipeline
2r 2t
critical advisory

Joomla com_mb24sysapi Module Unauthenticated RCE (CVE-2026-32968)

An unauthenticated remote attacker can exploit an OS command injection vulnerability (CVE-2026-32968) in the com_mb24sysapi module of Joomla, leading to remote code execution and full system compromise.

cve-2026-32968 joomla rce command-injection
2r 1t 3i
critical advisory

Belkin F9K1122 Router Stack-Based Buffer Overflow

A stack-based buffer overflow vulnerability exists in Belkin F9K1122 version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the 'formWISP5G' function.

cve-2026-4566 buffer-overflow router rce
2r 1t
critical threat

Unpatched GNU Inetutils Telnet Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the GNU Inetutils Telnet server, potentially allowing unauthenticated attackers to execute arbitrary code on vulnerable systems.

telnet rce inetutils
2r 2t
critical advisory

Multiple Critical Vulnerabilities in Veeam Backup & Replication Allow Remote Code Execution

Multiple critical vulnerabilities in Veeam Backup & Replication, including CVE-2026-21666, CVE-2026-21668, CVE-2026-21669, CVE-2026-21670, CVE-2026-21671, CVE-2026-21672, and CVE-2026-21708, allow for remote code execution, privilege escalation, and arbitrary file manipulation by authenticated users, potentially leading to a complete compromise of the backup infrastructure.

veeam rce vulnerability privilege-escalation
2r 3t
critical advisory

Critical Unauthenticated RCE Vulnerability in Junos OS Evolved

A critical unauthenticated remote code execution vulnerability, CVE-2026-21902, exists in Juniper Networks Junos OS Evolved PTX Series, allowing a network-based attacker to execute code as root, requiring immediate patching and increased monitoring.

junos rce vulnerability
2r 3t
critical advisory

Critical RCE Vulnerability in Cisco Catalyst SD-WAN Controller

A critical remote code execution vulnerability exists in Cisco Catalyst SD-WAN Controllers (CVE-2026-20127) due to improper authentication, allowing unauthenticated remote attackers to bypass authentication and gain administrative privileges, potentially leading to network configuration manipulation.

cisco sd-wan rce vulnerability
2r 2t 4i
critical advisory

Critical Vulnerabilities in SolarWinds Serv-U Allow Remote Code Execution

Multiple critical vulnerabilities in SolarWinds Serv-U MFT and FTP Server allow remote code execution, potentially leading to system compromise.

solarwinds serv-u rce vulnerability
2r 3t
critical advisory

VMware Aria Operations Vulnerabilities Allow Remote Code Execution and Privilege Escalation

Multiple vulnerabilities in VMware Aria Operations, Cloud Foundation, and Telco Cloud Platform/Infrastructure could allow unauthenticated remote code execution (CVE-2026-22719) and privilege escalation (CVE-2026-22720, CVE-2026-22721).

vmware aria-operations rce privilege-escalation
2r 2t 3i
critical advisory

Critical Vulnerabilities in FreeScout Help Desk Allow Remote Code Execution

Critical vulnerabilities, CVE-2026-27636 and CVE-2026-27637, exist in FreeScout Help Desk that could be exploited to achieve remote code execution, potentially leading to data exfiltration and system compromise.

freescout rce vulnerability apache
2r 2t
critical threat

Active Exploitation of Apache ActiveMQ RCE Vulnerability (CVE-2023-46604)

CVE-2023-46604 is a remote code execution vulnerability affecting Apache ActiveMQ that is actively exploited in the wild by ransomware operators, allowing remote attackers to execute arbitrary shell commands.

LockBit +2 activemq rce cve-2023-46604 ransomware
2r 2t
critical advisory

GStreamer Multiple Vulnerabilities Allow Remote Code Execution and Denial of Service

Multiple vulnerabilities in GStreamer could be exploited by a remote, anonymous attacker to execute arbitrary code or cause a denial of service condition.

GStreamer rce dos
2r 2t 5c
critical advisory

Breeze Cache Plugin Arbitrary File Upload Vulnerability (CVE-2026-3844)

The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.

Breeze Cache plugin wordpress plugin file-upload rce
2r 1t 1c
critical advisory

PhpSpreadsheet SSRF and RCE Vulnerability via IOFactory::load

PhpSpreadsheet is vulnerable to Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE) due to improper validation of filenames in the IOFactory::load function, exploitable via PHP wrappers like `phar://` and `ftp://`.

PhpSpreadsheet ssrf rce php deserialization
2r 2t
critical advisory

Xerte Online Toolkits Unauthenticated Remote Code Execution via elFinder Connector

Xerte Online Toolkits versions 3.15 and earlier are vulnerable to unauthenticated remote code execution due to a missing authentication check in the elFinder connector, allowing arbitrary file operations that can be chained with other vulnerabilities.

Xerte Online Toolkits CVE-2026-34413 xerte rce
2r 1t 1c
critical advisory

CVE-2026-31609 SMB Client Double-Free Vulnerability

CVE-2026-31609 is a critical double-free vulnerability in the SMB client, specifically within the smbd_free_send_io() function after smbd_send_batch_flush(), potentially leading to arbitrary code execution.

smb double-free cve-2026-31609 rce
2r 1c
critical advisory

Evolver Remote Code Execution via Command Injection in `_extractLLM()`

A command injection vulnerability in the `_extractLLM()` function of the evolver application allows remote attackers to execute arbitrary shell commands by injecting shell metacharacters into the `corpus` parameter, leading to potential system compromise.

@evomap/evolver command-injection rce evolver
2r 1t
high advisory

WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)

The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.

Drag and Drop File Upload for Contact Form 7 plugin wordpress file-upload rce plugin CVE-2026-5364
2r 1t 1c
critical advisory

WordPress Profile Builder Pro Plugin PHP Object Injection Vulnerability (CVE-2026-7647)

An unauthenticated PHP Object Injection vulnerability exists in the Profile Builder Pro WordPress plugin (versions up to 3.14.5) due to the insecure use of `maybe_unserialize()` on the 'args' POST parameter in the `wppb_request_users_pins_action_callback()` AJAX handler, potentially leading to arbitrary code execution.

Profile Builder Pro plugin php-object-injection wordpress plugin rce
2r 1t 1c
critical advisory

Weaver E-office Unauthenticated Arbitrary File Upload Vulnerability

Weaver E-office versions prior to 10.0_20221201 are vulnerable to unauthenticated arbitrary file upload in the OfficeServer.php endpoint, allowing attackers to upload PHP webshells and achieve remote code execution.

E-office cve-2022-50993 file-upload webshell rce
2r 2t 1c
critical advisory

VM2 Sandbox Escape via __lookupGetter__ Vulnerability

VM2 is vulnerable to a sandbox breakout via the `__lookupGetter__` method, enabling attackers to execute arbitrary commands on the host system by exploiting context switching and property descriptor manipulation, leading to remote code execution.

vm2 sandbox-escape rce
3r 2t
critical advisory

Totolink A8000RU OS Command Injection Vulnerability

A remote OS command injection vulnerability exists in Totolink A8000RU version 7.1cu.643_b20200521 via manipulation of the 'proto' argument in the /cgi-bin/cstecgi.cgi CGI handler, potentially leading to complete system compromise.

A8000RU 7.1cu.643_b20200521 command-injection rce totolink
2r 1t 1c
critical advisory

OpenMRS Stored Velocity SSTI to RCE via ConceptReferenceRange

OpenMRS is vulnerable to a Stored Velocity SSTI to RCE via ConceptReferenceRange, where the `ConceptReferenceRangeUtility.evaluateCriteria()` method evaluates database-stored criteria strings as Apache Velocity templates without a sandbox, allowing unrestricted Java reflection through template expressions, leading to persistent remote code execution and privilege escalation when a user with the `Manage Concepts` privilege stores a malicious Velocity template expression in a concept's reference range criteria field.

openmrs-api +1 ssti rce velocity openmrs
2r 2t
high advisory

LiteLLM Authenticated Command Execution via MCP stdio Test Endpoints

Authenticated users with low-privilege API keys could execute arbitrary commands on the host running LiteLLM via the `/mcp-rest/test/connection` and `/mcp-rest/test/tools/list` endpoints, by submitting a server configuration including command execution parameters.

litellm rce command-injection
2r 1t
critical advisory

OpenLearnX Remote Code Execution via Python Sandbox Escape

A critical RCE vulnerability in OpenLearnX allows for sandbox escape and arbitrary command execution in versions prior to 2.0.3.

openlearnx rce sandbox escape code injection
2r 1t
critical advisory

ExactMetrics WordPress Plugin Vulnerability Leads to Remote Code Execution

The ExactMetrics plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation via a REST API endpoint, potentially leading to remote code execution by authenticated attackers.

ExactMetrics – Google Analytics Dashboard for WordPress wordpress plugin rce cve-2026-5464 exactmetrics
2r 4t 1c
critical advisory

ELBA5 5.8.0 Remote Code Execution Vulnerability

ELBA5 version 5.8.0 contains a remote code execution vulnerability (CVE-2018-25272) that allows attackers to obtain database credentials and execute arbitrary commands with SYSTEM level permissions, potentially leading to complete system compromise.

ELBA5 5.8.0 rce database credential-access cve-2018-25272 elba5
2r 3t 1c
critical advisory

CI4MS Theme Upload Zip Slip Vulnerability

A critical vulnerability exists in ci4ms Theme::upload, where improper validation of ZIP archive entry names allows authenticated users with theme creation permissions to write files to arbitrary locations, leading to remote code execution.

ci4-cms-erp/ci4ms zip-slip rce codeigniter vulnerability
2r 2t