Exploiting CVEs

Our Latest Research Around Critical CVEs: Understanding, Exploiting & Defending against
Exploiting CVEs
September 1, 2025

CVE-2024-10924: Exploiting Critical WordPress Plugin Vulnerability

In November 2024, a critical vulnerability, tracked as CVE-2024-10924, was discovered in the Really Simple Security plugin for WordPress, affecting versions 9.0.0 to 9.1.1.1. With a CVSS score of 9.8, this authentication bypass flaw poses a severe risk to WordPress sites, potentially allowing attackers to gain unauthorized administrative access.
Exploiting CVEs
August 9, 2025

CVE-2025-3248 | Langflow Unauthenticated Remote Code Execution Vulnerability

Langflow (before version 1.3.0) had a feature that allowed people to submit Python code snippets so the server could “check” them. Unfortunately, the way this was built meant the server wasn’t just checking the code, it was actually running pieces of it. That’s CVE-2025-3248, a critical unauthenticated remote code execution (RCE) vulnerability with a CVSS of 9.8.
Exploiting CVEs
August 25, 2025

CVE-2023-50164: Critical Apache Struts RCE Vulnerability

CVE-2023-50164, disclosed in 2023, is a critical path traversal vulnerability in Apache Struts, an open-source framework for building Java web applications using the Model-View-Controller (MVC) architecture.
Exploiting CVEs
September 12, 2025

CVE-2025-49113 | Roundcube Post-Auth RCE via PHP Object Deserialization

CVE-2025-49113 is a Post-Authentication Remote Code Execution (RCE) vulnerability in Roundcube Webmail, one of the most widely used open-source webmail clients written in PHP. The vulnerability arises due to unsafe PHP object deserialization, allowing an authenticated attacker to execute arbitrary code on the server.
Exploiting CVEs
August 14, 2025

CVE-2021-29447 | WordPress Media Library XXE

CVE-2021-29447 is an Authenticated XML External Entity (XXE) vulnerability exploitable in WordPress versions 5.6 to 5.7.1. The issue affects the Media Library, which allows authenticated users (like contributors or authors) to upload media files.
Exploiting CVEs
September 9, 2025

CVE-2024-45195: Apache OFBiz Unauthenticated Remote Code Execution (RCE)

CVE-2024-45195 is a critical vulnerability in Apache OFBiz, a widely used open-source enterprise resource planning (ERP) system with a CVSS score of 7.5 by NVD. The flaw enables unauthenticated remote code execution (RCE) due to an insecure use of Java's scripting engine within the web application's request handling logic. This exploit bypasses previously issued patches (CVE‑2024‑32113, ‑36104, ‑38856)
Exploiting CVEs
July 31, 2025

CVE-2025-29927: Next.js Middleware Authorization Bypass Vulnerability

Vercel disclosed a critical vulnerability, CVE-2025-29927 affecting the middleware system in Next.js, a popular React-based web development framework. This vulnerability allows attackers to bypass middleware-based authorization checks and access protected routes by abusing an internal header. CVSS Score: 9.1 (Critical)
Exploiting CVEs
July 4, 2024

Unlocking the World of CVEs: CVE Cipher Lab

Start by studying known critical CVEs, understanding their impact, and exploring how they can be exploited. Welcome to CVE Cipher Lab by Enciphers
Exploiting CVEs
September 11, 2025

CVE-2024-34082: Grav Vulnerable to Arbitrary File Read Leading to Account Takeover

Grav CMS versions before 1.7.46 are affected by a critical flaw (CVE-2024-34082) that lets low-privileged users read sensitive server files. By exploiting Twig templating logic, attackers can access user data, paving the way for account takeover.
Exploiting CVEs
October 8, 2024

CVE-2024-4040: Navigating the Risks of SSTI in CrushFTP

CVE-2024-4040 is a critical vulnerability enabling attackers to exploit improper input validation, risking code execution or system compromise. Organizations should apply patches promptly to avoid breaches and disruptions, emphasizing the need for timely updates.
Exploiting CVEs
July 4, 2025

CVE-2022-44268: Arbitrary File Disclosure via PNG in ImageMagick

CVE-2022-44268 is a critical security vulnerability affecting ImageMagick version 7.1.0-49. When processing a PNG image, ImageMagick may inadvertently embed the contents of an arbitrary remote file into the resulting image.
Exploiting CVEs
August 18, 2025

Understanding CVE-2024–27348: A Critical Vulnerability in Apache HugeGraph Server

CVE-2024–27348 is a critical Remote Code Execution (RCE) vulnerability affecting Apache HugeGraph Server versions 1.0.0 to 1.2.1 when running on Java 8 or Java 11. With a CVSS v3.1 score of 9.8, it is considered highly severe due to its potential for unauthenticated attackers to execute arbitrary operating system commands.
Exploiting CVEs
June 30, 2024

Critical Authentication Bypass Vulnerability in InfiniteWP Client Plugin

The InfiniteWP Client plugin versions 1.9.4.4 and earlier have a critical authentication bypass vulnerability (CVE-2020-8772) that allows attackers to access and control WordPress sites without proper credentials.
Exploiting CVEs
July 1, 2024

Cacti’s Thorn: Unveiling the CVE-2022-46169 Vulnerability

A critical vulnerability (CVE-2022-46169) in Cacti versions 1.2.22 and below allows remote attackers to execute arbitrary code via the remote_client_authorized function in cacti/remote_agent.php.
Exploiting CVEs
July 1, 2024

In the Crosshairs: Understanding CVE-2024-23897's Technical Implications

Exploring a critical vulnerability (CVE-2024-23897) allowing malicious users to read files and potentially execute remote code; this blog post explores its impact, exploits, and mitigation strategies.
Exploiting CVEs
June 27, 2024

Apache ActiveMQ Under Siege: Understanding CVE-2023-46604

CVE-2023-46604 is a critical remote code execution vulnerability in Apache ActiveMQ, caused by improper input validation, allowing malicious payloads to execute arbitrary code on affected servers, leading to unauthorized access
Exploiting CVEs
June 28, 2024

Apache HTTPD Remote Code Execution (CVE-2021-42013)

CVE-2021-42013 is a significant vulnerability in Apache HTTP Server versions 2.4.49 and 2.4.50, arising from an inadequate fix for CVE-2021-41773, allowing attackers to exploit path traversal attacks and potentially achieve remote code execution if CGI scripts are enabled.
Exploiting CVEs
April 1, 2024

Text4Shell(CVE-2022-42889)

Blog on CVE-2022-42889 explores a critical vulnerability found in Apache commons text in October 2022. Let's jump into its technicality.
Exploiting CVEs
March 29, 2024

RCE on MobSF(CVE-2024-21633)

This CVE exposes a critical security vulnerability in Apktool, a widely-used tool for reverse engineering closed-source, third-party Android apps.
Exploiting CVEs

Path Traversal in Openfire Admin Console

Enter CVE-2023-32315, an authentication bypass vulnerability discovered in Openfire, a popular XMPP server. This exploit grants malicious actors unrestricted access to the Openfire administrative console.
Exploiting CVEs
February 27, 2024

AI Engine WordPress Plugin(CVE-2023-51409)

Delve into CVE-2023-51409, a severe security flaw that affected the AI Engine plugin—a widely used AI-related WordPress plugin with over 50,000 active installations.
Exploiting CVEs
March 25, 2024

Apache Spark Command Injection Vulnerability

Join us as we investigate CVE-2022-33891, a critical vulnerability discovered in Apache Spark, a widely-used distributed computing framework. This flaw, involving command injection, poses severe risks of unauthorized access and control.
Exploiting CVEs
March 22, 2024

Ultimate Member plugin(CVE-2024-1071)

This blog addresses CVE-2024-1071, a critical security vulnerability found in the Ultimate Member plugin for WordPress. With over 200,000 active installations affected, it's essential to comprehend the intricacies of this issue.
Exploiting CVEs
March 20, 2024

Confluence Template Injection (CVE-2023-22527)

This blog takes a deep dive into the intricacies of the Atlassian Confluence CVE-2023-22527 vulnerability. It aims to illuminate the inner workings of the exploit and provide actionable defense strategies that organizations can implement effectively.
Exploiting CVEs
July 19, 2023

Office and Windows HTML Remote Code Execution (CVE-2023-36884)

CVE-2023-36884: Lets discuss the attack method, the elements that contributed to its success, and potential mitigation strategies
Exploiting CVEs
May 31, 2023

Spring4Shell (CVE-2022-22965)

Dive into the details of Spring4Shell CVE-2022-22965, a critical vulnerability that was discovered in the Spring Framework
Exploiting CVEs
June 22, 2023

Confluence (CVE-2022-26134)

Explore the vulnerability, how to exploit it, its potential impact, and the essential steps organisations can take to protect their virtual infrastructure
Exploiting CVEs
July 2, 2023

VMware vSphere (CVE-2021-21972)

Explore the vulnerability, how to exploit it, its potential impact, and the essential steps organisations can take to protect their virtual infrastructure
Exploiting CVEs
May 24, 2023

Exploiting Log4Shell or Log4j (CVE 2021-44228)

A critical vulnerability known as CVE 2021-44228 was discovered in the popular logging tool Log4j. This vulnerability allowed attackers to execute remote code on servers and gain unauthorized access to sensitive data.