Remote Code Execution
Remote Code Execution (RCE) vulnerabilities allow an attacker to execute arbitrary code on a remote system without authorization. These are among the most severe vulnerabilities as they can lead to complete system compromise.
17
CRITICAL
Execution
Understanding Remote Code Execution
Remote Code Execution vulnerabilities represent the most critical class of security flaws. When exploited, they allow attackers to run arbitrary commands on a target system, often with the same privileges as the vulnerable application.
RCE vulnerabilities commonly arise from unsafe deserialization, command injection, or memory corruption bugs. They're frequently found in web applications, network services, and system utilities.
How to Identify
- •Look for input validation bypasses in file upload functionality
- •Check for unsafe deserialization of user-controlled data
- •Test command execution functions with special characters
- •Review template engines for server-side template injection
Prevention Best Practices
- ✓Use parameterized queries and prepared statements
- ✓Implement strict input validation and sanitization
- ✓Run applications with minimal privileges
- ✓Keep all software dependencies up to date
- ✓Use security headers and Content Security Policy
Remote Code Execution CVEs (17)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-26268 | 9.9 | An attacker can exploit a flaw in the Cursor code editor to gain control of the system by manipulating Git settings, allowing them to run harmful commands without any user interaction. This vulnerability affects versions prior to 2.5 and can lead to remote code execution when certain Git hooks are triggered. | anyspherecursor | Exploit Available | 7 days agoFeb 13, 2026 |
| CVE-2026-26221 | 10.0 | An attacker can exploit a critical vulnerability in Hyland OnBase to send malicious requests that allow them to read or write files on the server, potentially leading to remote code execution. This requires the attacker to have network access to the OnBase Workflow Timer Service, which listens on a specific port. | Unknown | Exploit Available | 7 days agoFeb 13, 2026 |
| CVE-2025-70095 | 6.5 | This vulnerability allows attackers to run malicious scripts on the OpenSourcePOS platform, potentially stealing sensitive information from users or manipulating transactions. It occurs when an attacker can inject harmful code into the item management or sales invoice sections, which requires them to have access to those functions in the application. | opensourceposopen source point of sale | Theoretical | 7 days agoFeb 13, 2026 |
| CVE-2025-70094 | 6.5 | This vulnerability allows attackers to run malicious scripts on a user's browser by injecting harmful code into the Item Category field when generating barcodes. It requires the attacker to have access to the web interface of OpenSourcePOS, making it important for users to be cautious about input validation and access controls. | opensourceposopen source point of sale | Theoretical | 7 days agoFeb 13, 2026 |
| CVE-2025-70093 | 7.4 | This vulnerability allows attackers to run any code they want on the OpenSourcePOS system by sending a specially crafted response through AJAX. It requires the attacker to have access to the system's web interface, making it a serious risk if proper security measures are not in place. | opensourceposopen source point of sale | Theoretical | 7 days agoFeb 13, 2026 |
| CVE-2025-70091 | 6.5 | This vulnerability allows attackers to run malicious scripts in a user's browser by injecting harmful code into the Phone Number field in the Customers function of OpenSourcePOS v3.4.1. It requires the attacker to trick a user into visiting a page where this code is executed, potentially leading to data theft or session hijacking. | opensourceposopen source point of sale | Theoretical | 7 days agoFeb 13, 2026 |
| CVE-2026-26056 | 8.8 | An attacker can execute malicious code on the Yoke system, potentially gaining control over Kubernetes resources or escalating their privileges to the highest level. This vulnerability requires the attacker to have permissions to create or update resources in the system. | Unknown | Exploit Available | 8 days agoFeb 12, 2026 |
| CVE-2026-26020 | 9.4 | This vulnerability allows an authenticated user to run malicious code on the backend server of the AutoGPT platform, potentially taking full control of the system. It occurs because the platform fails to properly enforce restrictions on a development tool, enabling users to bypass security measures by embedding it in their workflows. | agptautogpt platform | Theoretical | 8 days agoFeb 12, 2026 |
| CVE-2026-26005 | 5.0 | This vulnerability allows an attacker to send requests to internal servers on a network by tricking the system into thinking they are accessing a video from an external URL. Even regular users can exploit this flaw without needing special permissions, making it possible for them to scan and potentially discover sensitive information about the internal network. | oxygenzclipbucket | Theoretical | 8 days agoFeb 12, 2026 |
| CVE-2026-25933 | 6.8 | An attacker with physical access to a modified Arduino board can exploit a flaw in the Arduino App Lab to inject malicious commands that run on the user's computer, potentially allowing them to take control of the system. This requires the attacker to tamper with the board beforehand and connect it to the app. | Unknown | Theoretical | 8 days agoFeb 12, 2026 |
| CVE-2026-25922 | 8.8 | An attacker can inject a harmful authentication message into the authentik identity provider, potentially allowing them to impersonate a legitimate user. This can happen if the system is configured to verify the signature of the assertion but not the response, or if it lacks proper encryption settings. | goauthentikauthentik | Theoretical | 8 days agoFeb 12, 2026 |
| CVE-2026-25748 | 7.5 | This vulnerability allows an attacker to bypass authentication and gain unauthorized access to systems using the authentik identity provider when it is set up with certain reverse proxies like Traefik or Caddy. This can happen if the attacker sends a specially crafted cookie, allowing them to access resources without proper credentials, but it only affects versions prior to the specified updates. | goauthentikauthentik | Exploit Available | 8 days agoFeb 12, 2026 |
| CVE-2026-25227 | 7.2 | This vulnerability allows an attacker with specific permissions to run arbitrary code on the authentik server, potentially taking control of the system. It affects versions from 2021.3.1 up to just before 2025.8.6, 2025.10.4, and 2025.12.4, and requires the attacker to have permission to view certain property mappings or policies. | goauthentikauthentik | Theoretical | 8 days agoFeb 12, 2026 |
| CVE-2026-21438 | 5.3 | An attacker can exploit this vulnerability to overwhelm a system by repeatedly opening and closing WebTransport streams, which leads to excessive memory use because the system fails to properly clean up closed streams. This issue occurs in versions prior to 0.10.0, so updating to the latest version is essential to prevent this problem. | Unknown | Exploit Available | 8 days agoFeb 12, 2026 |
| CVE-2026-21434 | 5.3 | An attacker can exploit a flaw in the webtransport-go software to send an excessively large message, causing the system to use up all available memory and potentially crash or slow down. This requires the attacker to send a large payload, but since there’s no limit on the size, they can easily overwhelm the system if they have enough bandwidth. | Unknown | Exploit Available | 8 days agoFeb 12, 2026 |
| CVE-2024-35224 | 7.6 | This vulnerability allows an attacker to inject malicious JavaScript into the OpenProject application, potentially compromising other users' accounts. To exploit this, the attacker needs permissions to edit work packages and add attachments, and they could use this to target a System Admin for privilege escalation. | openprojectopenproject | Theoretical | over 1 year agoMay 23, 2024 |
| CVE-2023-1041 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into the website, which could lead to unauthorized actions or data theft from users who visit the affected page. It can be exploited remotely by manipulating a specific input field without needing any special access or credentials. | oretnom23simple responsive tourism website | Exploit Available | almost 3 years agoFeb 26, 2023 |