Remote Code Execution

Remote Code Execution (RCE) vulnerabilities allow an attacker to execute arbitrary code on a remote system without authorization. These are among the most severe vulnerabilities as they can lead to complete system compromise.

Total CVEs

289

Typical Severity

CRITICAL

Category

Execution

Understanding Remote Code Execution

Remote Code Execution vulnerabilities represent the most critical class of security flaws. When exploited, they allow attackers to run arbitrary commands on a target system, often with the same privileges as the vulnerable application.

RCE vulnerabilities commonly arise from unsafe deserialization, command injection, or memory corruption bugs. They're frequently found in web applications, network services, and system utilities.

How to Identify

  • Look for input validation bypasses in file upload functionality
  • Check for unsafe deserialization of user-controlled data
  • Test command execution functions with special characters
  • Review template engines for server-side template injection

Prevention Best Practices

  • Use parameterized queries and prepared statements
  • Implement strict input validation and sanitization
  • Run applications with minimal privileges
  • Keep all software dependencies up to date
  • Use security headers and Content Security Policy

Remote Code Execution CVEs (289)

DescriptionVendor / ProductExploit Status
CVE-2026-23855.3

This vulnerability allows an attacker to manipulate email routing and redirection settings in the Plus Addons for Elementor plugin, potentially sending unauthorized emails or redirecting users to malicious sites. It can be exploited by anyone without needing to log in, as the plugin does not properly verify the authenticity of the data it processes.

Unknown
Exploit Available
about 2 months agoFeb 22, 2026
CVE-2026-28676.9

An attacker can exploit a weakness in the vehicle management system to manipulate a specific ID in a web request, allowing them to run harmful SQL commands on the database remotely. This vulnerability can be exploited without needing special access, making it a significant risk for anyone using this software.

admercvehicle management system
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2026-274805.3

This vulnerability allows attackers to discover valid usernames by measuring how long the server takes to respond to login attempts; valid usernames take longer due to additional processing. It affects versions 2.1.0 through 2.40.1 of the static web server, and attackers can exploit this by trying different usernames to see which ones are valid before attempting to guess passwords.

static-web-serverstatic web server
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2025-143396.5

An attacker can permanently delete all forms created with the weMail plugin on WordPress sites by exploiting a flaw that allows them to send a delete request using a nonce exposed in the page source, without needing to log in. This vulnerability affects all versions up to 2.0.7, and it means that anyone visiting the site can potentially wipe out important email marketing forms.

Unknown
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2026-274797.7

An attacker can exploit a vulnerability in Wallos to trick the application into accessing internal resources, such as sensitive cloud metadata, by using specially crafted URLs that redirect to these resources. This requires the attacker to provide a URL that the application initially accepts, as it only checks the IP address of the first request and not any subsequent redirects.

wallosappwallos
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2026-28656.9

This vulnerability allows an attacker to execute malicious SQL commands on the Agri-Trading Online Shopping System, potentially giving them access to sensitive data or the ability to manipulate the database. The attack can be carried out remotely by sending specially crafted requests to the system without needing any special access or credentials.

adonesevangelistaagri-trading online shopping system
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2026-274708.8

This vulnerability allows an attacker with permission to edit and view events in ZoneMinder to run any SQL commands they want against the database, potentially exposing or altering sensitive data. The attacker must be logged in as a user with those specific permissions to exploit this flaw.

zoneminderzoneminder
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2026-274672.4

This vulnerability allows a malicious server operator to potentially access audio data from users who join a BigBlueButton session with their microphone muted, even though the audio isn't heard by other participants. This issue occurs only between the time a user joins the meeting and when they first unmute their microphone, and it has been fixed in the latest version.

bigbluebuttonbigbluebutton
Theoretical
about 2 months agoFeb 21, 2026
CVE-2026-274668.2

An attacker can exploit a vulnerability in BigBlueButton to overload the server or crash a critical process by sending large files, which can lead to a Denial of Service. This issue only affects users who followed specific instructions in the documentation and is fixed in the latest version.

bigbluebuttonbigbluebutton
Theoretical
about 2 months agoFeb 21, 2026
CVE-2026-274647.7

This vulnerability allows a low-privileged user to access sensitive information, such as database credentials, from a Metabase instance by exploiting email template features. It affects certain versions of the software, and users can mitigate the risk by disabling notifications to prevent access to the vulnerable parts of the system.

Unknown
Theoretical
about 2 months agoFeb 21, 2026
CVE-2026-274719.3

This vulnerability allows an attacker to access sensitive documents in the ERPNext system without proper authorization, potentially exposing confidential information. It affects versions up to 15.98.0 and 16.0.0-rc.1 and requires the attacker to have access to certain endpoints that do not properly check user permissions.

frappeerpnext
Theoretical
about 2 months agoFeb 21, 2026
CVE-2026-272068.1

This vulnerability allows an attacker to execute arbitrary code on a vulnerable application by sending specially crafted JSON data that can instantiate dangerous classes. It occurs when the application uses an insecure deserialization method without proper checks on the input, particularly if it processes untrusted JSON data.

Unknown
Theoretical
about 2 months agoFeb 21, 2026
CVE-2025-679696.5

This vulnerability allows an attacker to bypass security controls and gain unauthorized access to sensitive payment information in the UPI QR Code Payment Gateway for WooCommerce. It affects versions up to 1.5.1 and can be exploited if the access settings are not properly configured.

Unknown
Theoretical
about 2 months agoFeb 20, 2026
CVE-2025-143575.3

This vulnerability allows attackers with at least Subscriber-level access to create new pages and change site settings on a WordPress site using the Mega Store Woocommerce theme. The issue arises because the system doesn't properly check if the user has permission to make these changes, making it easier for unauthorized users to manipulate the site.

Unknown
Exploit Available
about 2 months agoFeb 19, 2026
CVE-2025-142945.3

Attackers can change the billing and shipping contact information, like email and phone numbers, for any WooCommerce order just by knowing or guessing the order ID. This vulnerability exists because the plugin doesn't properly check if the attacker is authorized, allowing anyone to make these changes without needing to log in.

Unknown
Exploit Available
about 2 months agoFeb 19, 2026
CVE-2025-139305.3

This vulnerability allows attackers to delete attachments linked to guest orders on WooCommerce sites, even if they are not logged in. It happens because the plugin fails to properly check if a user has permission to delete those attachments, making it easy for anyone to exploit this flaw using just a specific nonce and attachment ID.

Unknown
Exploit Available
about 2 months agoFeb 19, 2026
CVE-2025-135876.5

This vulnerability allows an attacker to bypass two-factor authentication on WordPress sites using the affected plugin, enabling them to log in without the second verification step. To exploit this, the attacker simply needs to include any value in the 'token' parameter during the login process, which could even be left empty.

Unknown
Exploit Available
about 2 months agoFeb 19, 2026
CVE-2025-129757.2

This vulnerability allows attackers with Shop Manager-level access or higher to install any plugin on a WordPress site, potentially leading to full control over the site through remote code execution. The issue arises from a lack of security checks in a specific function of the WooCommerce Product Feed Manager plugin, making it easy for these authenticated users to exploit the flaw.

Unknown
Exploit Available
about 2 months agoFeb 19, 2026
CVE-2025-125005.3

An attacker can upload files to a WordPress site using the Checkout Field Manager plugin without needing to log in, as the plugin fails to check if the user is authorized for this action. While the types of files they can upload are limited to common formats like images and documents, this still poses a risk of malicious content being introduced to the server.

Unknown
Exploit Available
about 2 months agoFeb 19, 2026
CVE-2025-123756.4

This vulnerability allows attackers with Contributor-level access or higher to trick the website into making requests to any external server, potentially exposing sensitive internal information or modifying data. The issue arises from the plugin not properly checking the URLs provided by users before using them, which can lead to unauthorized access to internal services.

Unknown
Exploit Available
about 2 months agoFeb 19, 2026
Showing 181 to 200 of 289 results
1...91011...15