<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>appsec.fyi — RCE</title>
  <link>https://appsec.fyi/rce.html</link>
  <description>Curated RCE resources from appsec.fyi</description>
  <language>en-us</language>
  <atom:link href="https://appsec.fyi/feeds/rce.xml" rel="self" type="application/rss+xml"/>
  <lastBuildDate>Sun, 12 Apr 2026 04:12:19 +0000</lastBuildDate>
  <managingEditor>carl@chs.us (Carl Sampson)</managingEditor>
  <item>
    <title>U-Office Force Critical RCE via Insecure Deserialization (CVE-2026-3422)</title>
    <link>https://www.thehackerwire.com/u-office-force-critical-rce-via-insecure-deserialization-cve-2026-3422/</link>
    <guid isPermaLink="true">https://www.thehackerwire.com/u-office-force-critical-rce-via-insecure-deserialization-cve-2026-3422/</guid>
    <description>U-Office Force Critical RCE via Insecure Deserialization (CVE-2026-3422)</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:30 +0000</pubDate>
  </item>
  <item>
    <title>IBM Langflow Desktop RCE via Insecure Deserialization</title>
    <link>https://www.thehackerwire.com/ibm-langflow-desktop-rce-via-insecure-deserialization/</link>
    <guid isPermaLink="true">https://www.thehackerwire.com/ibm-langflow-desktop-rce-via-insecure-deserialization/</guid>
    <description>IBM Langflow Desktop RCE via Insecure Deserialization</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:29 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-21858: Ni8mare Enables Unauthenticated RCE in n8n Webhooks</title>
    <link>https://www.upwind.io/feed/cve-2026-21858-n8n-unauthenticated-rce</link>
    <guid isPermaLink="true">https://www.upwind.io/feed/cve-2026-21858-n8n-unauthenticated-rce</guid>
    <description>CVE-2026-21858: Ni8mare Enables Unauthenticated RCE in n8n Webhooks</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:29 +0000</pubDate>
  </item>
  <item>
    <title>Potentially Critical RCE in OpenSSL (CVE-2025-15467)</title>
    <link>https://research.jfrog.com/post/potential-rce-vulnerabilityin-openssl-cve-2025-15467/</link>
    <guid isPermaLink="true">https://research.jfrog.com/post/potential-rce-vulnerabilityin-openssl-cve-2025-15467/</guid>
    <description>Potentially Critical RCE in OpenSSL (CVE-2025-15467)</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:28 +0000</pubDate>
  </item>
  <item>
    <title>Wazuh RCE via Deserialization of Untrusted Data (CVE-2026-25769)</title>
    <link>https://www.thehackerwire.com/wazuh-rce-via-deserialization-of-untrusted-data-cve-2026-25769/</link>
    <guid isPermaLink="true">https://www.thehackerwire.com/wazuh-rce-via-deserialization-of-untrusted-data-cve-2026-25769/</guid>
    <description>Wazuh RCE via Deserialization of Untrusted Data (CVE-2026-25769)</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:27 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-55182: React and Next.js Deserialization RCE Deep Dive</title>
    <link>https://www.akamai.com/blog/security-research/cve-2025-55182-react-nextjs-server-functions-deserialization-rce</link>
    <guid isPermaLink="true">https://www.akamai.com/blog/security-research/cve-2025-55182-react-nextjs-server-functions-deserialization-rce</guid>
    <description>CVE-2025-55182: React and Next.js Deserialization RCE Deep Dive</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:27 +0000</pubDate>
  </item>
  <item>
    <title>Active Exploitation of 7-Zip RCE Vulnerability</title>
    <link>https://blog.qualys.com/product-tech/2025/12/04/active-exploitation-of-7-zip-rce-vulnerability-shows-why-manual-patching-is-no-longer-an-option</link>
    <guid isPermaLink="true">https://blog.qualys.com/product-tech/2025/12/04/active-exploitation-of-7-zip-rce-vulnerability-shows-why-manual-patching-is-no-longer-an-option</guid>
    <description>Active Exploitation of 7-Zip RCE Vulnerability</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:26 +0000</pubDate>
  </item>
  <item>
    <title>Update on React Server Components RCE (CVE-2025-55182 / CVE-2025-66478)</title>
    <link>https://securityboulevard.com/2025/12/update-on-react-server-components-rce-vulnerability-cve-2025-55182-cve-2025-66478/</link>
    <guid isPermaLink="true">https://securityboulevard.com/2025/12/update-on-react-server-components-rce-vulnerability-cve-2025-55182-cve-2025-66478/</guid>
    <description>Update on React Server Components RCE (CVE-2025-55182 / CVE-2025-66478)</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:25 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-34291 Exploited in the Wild: LangFlow AI Under Fire</title>
    <link>https://www.crowdsec.net/vulntracking-report/cve-2025-34291</link>
    <guid isPermaLink="true">https://www.crowdsec.net/vulntracking-report/cve-2025-34291</guid>
    <description>CVE-2025-34291 Exploited in the Wild: LangFlow AI Under Fire</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:24 +0000</pubDate>
  </item>
  <item>
    <title>New runC Vulnerabilities Expose Docker and Kubernetes to Container Escape</title>
    <link>https://orca.security/resources/blog/new-runc-vulnerabilities-allow-container-escape/</link>
    <guid isPermaLink="true">https://orca.security/resources/blog/new-runc-vulnerabilities-allow-container-escape/</guid>
    <description>New runC Vulnerabilities Expose Docker and Kubernetes to Container Escape</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:24 +0000</pubDate>
  </item>
  <item>
    <title>What Is SSTI in Golang? Server-Side Template Injection Security</title>
    <link>https://www.oligo.security/blog/safe-by-default-or-vulnerable-by-design-golang-server-side-template-injection</link>
    <guid isPermaLink="true">https://www.oligo.security/blog/safe-by-default-or-vulnerable-by-design-golang-server-side-template-injection</guid>
    <description>What Is SSTI in Golang? Server-Side Template Injection Security</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:23 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-39601: WordPress Custom CSS, JS and PHP Plugin CSRF to RCE</title>
    <link>https://github.com/Nxploited/CVE-2025-39601</link>
    <guid isPermaLink="true">https://github.com/Nxploited/CVE-2025-39601</guid>
    <description>CVE-2025-39601: WordPress Custom CSS, JS and PHP Plugin CSRF to RCE</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:22 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-7384: Critical WordPress Plugin Unauthenticated RCE</title>
    <link>https://hadrian.io/blog/cve-2025-7384-critical-wordpress-plugin-unauthenticated-rce</link>
    <guid isPermaLink="true">https://hadrian.io/blog/cve-2025-7384-critical-wordpress-plugin-unauthenticated-rce</guid>
    <description>CVE-2025-7384: Critical WordPress Plugin Unauthenticated RCE</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:21 +0000</pubDate>
  </item>
  <item>
    <title>Sneeit WordPress RCE Exploited in the Wild</title>
    <link>https://thehackernews.com/2025/12/sneeit-wordpress-rce-exploited-in-wild.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2025/12/sneeit-wordpress-rce-exploited-in-wild.html</guid>
    <description>Sneeit WordPress RCE Exploited in the Wild</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:21 +0000</pubDate>
  </item>
  <item>
    <title>Critical Pre-Auth RCE in ChurchCRM Setup Wizard</title>
    <link>https://www.thehackerwire.com/critical-pre-auth-rce-in-churchcrm-setup-wizard/</link>
    <guid isPermaLink="true">https://www.thehackerwire.com/critical-pre-auth-rce-in-churchcrm-setup-wizard/</guid>
    <description>Critical Pre-Auth RCE in ChurchCRM Setup Wizard</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:20 +0000</pubDate>
  </item>
  <item>
    <title>Critical Unauthenticated RCE in n8n (CVE-2026-21858, CVSS 10.0)</title>
    <link>https://orca.security/resources/blog/cve-2026-21858-n8n-rce-vulnerability/</link>
    <guid isPermaLink="true">https://orca.security/resources/blog/cve-2026-21858-n8n-rce-vulnerability/</guid>
    <description>Critical Unauthenticated RCE in n8n (CVE-2026-21858, CVSS 10.0)</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:19 +0000</pubDate>
  </item>
  <item>
    <title>TryHackMe Spring AI: CVE-2026-22738 RCE Writeup</title>
    <link>https://medium.com/h7w/tryhackme-spring-ai-cve-2026-22738-writeup-354db657d620</link>
    <guid isPermaLink="true">https://medium.com/h7w/tryhackme-spring-ai-cve-2026-22738-writeup-354db657d620</guid>
    <description>TryHackMe Spring AI: CVE-2026-22738 RCE Writeup</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:18 +0000</pubDate>
  </item>
  <item>
    <title>Dangerous runC Flaws Allow Hackers to Escape Docker Containers</title>
    <link>https://www.bleepingcomputer.com/news/security/dangerous-runc-flaws-could-allow-hackers-to-escape-docker-containers/</link>
    <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/dangerous-runc-flaws-could-allow-hackers-to-escape-docker-containers/</guid>
    <description>Dangerous runC Flaws Allow Hackers to Escape Docker Containers</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:18 +0000</pubDate>
  </item>
  <item>
    <title>runC Container Escape Vulnerabilities: A Technical Overview</title>
    <link>https://www.cncf.io/blog/2025/11/28/runc-container-breakout-vulnerabilities-a-technical-overview/</link>
    <guid isPermaLink="true">https://www.cncf.io/blog/2025/11/28/runc-container-breakout-vulnerabilities-a-technical-overview/</guid>
    <description>runC Container Escape Vulnerabilities: A Technical Overview</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:17 +0000</pubDate>
  </item>
  <item>
    <title>New runC Vulnerabilities Allow Container Escape in Docker and Kubernetes</title>
    <link>https://www.sysdig.com/blog/runc-container-escape-vulnerabilities</link>
    <guid isPermaLink="true">https://www.sysdig.com/blog/runc-container-escape-vulnerabilities</guid>
    <description>New runC Vulnerabilities Allow Container Escape in Docker and Kubernetes</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:16 +0000</pubDate>
  </item>
  <item>
    <title>Attackers Exploit Critical Langflow RCE as CISA Sounds Alarm</title>
    <link>https://www.csoonline.com/article/4151203/attackers-exploit-critical-langflow-rce-within-hours-as-cisa-sounds-alarm.html</link>
    <guid isPermaLink="true">https://www.csoonline.com/article/4151203/attackers-exploit-critical-langflow-rce-within-hours-as-cisa-sounds-alarm.html</guid>
    <description>Attackers Exploit Critical Langflow RCE as CISA Sounds Alarm</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:16 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-33017: How Attackers Compromised Langflow AI Pipelines in 20 Hours</title>
    <link>https://www.sysdig.com/blog/cve-2026-33017-how-attackers-compromised-langflow-ai-pipelines-in-20-hours</link>
    <guid isPermaLink="true">https://www.sysdig.com/blog/cve-2026-33017-how-attackers-compromised-langflow-ai-pipelines-in-20-hours</guid>
    <description>CVE-2026-33017: How Attackers Compromised Langflow AI Pipelines in 20 Hours</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:15 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-3248: RCE Vulnerability in Langflow</title>
    <link>https://www.zscaler.com/blogs/security-research/cve-2025-3248-rce-vulnerability-langflow</link>
    <guid isPermaLink="true">https://www.zscaler.com/blogs/security-research/cve-2025-3248-rce-vulnerability-langflow</guid>
    <description>CVE-2025-3248: RCE Vulnerability in Langflow</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:14 +0000</pubDate>
  </item>
  <item>
    <title>React2Shell Explained: From Vulnerability Discovery to Exploitation</title>
    <link>https://www.resecurity.com/blog/article/react2shell-explained-cve-2025-55182-from-vulnerability-discovery-to-exploitation</link>
    <guid isPermaLink="true">https://www.resecurity.com/blog/article/react2shell-explained-cve-2025-55182-from-vulnerability-discovery-to-exploitation</guid>
    <description>React2Shell Explained: From Vulnerability Discovery to Exploitation</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:13 +0000</pubDate>
  </item>
  <item>
    <title>Protecting Against the Critical React2Shell RCE Exposure</title>
    <link>https://www.sentinelone.com/blog/protecting-against-critical-react2shell-rce-exposure/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/blog/protecting-against-critical-react2shell-rce-exposure/</guid>
    <description>Protecting Against the Critical React2Shell RCE Exposure</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:12 +0000</pubDate>
  </item>
  <item>
    <title>React2Shell: Node.js RCE Against a Production Next.js App</title>
    <link>https://hunt.io/blog/react2shell-cve-2025-55182-nextjs-nodejs-rce</link>
    <guid isPermaLink="true">https://hunt.io/blog/react2shell-cve-2025-55182-nextjs-nodejs-rce</guid>
    <description>React2Shell: Node.js RCE Against a Production Next.js App</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:12 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-68613: RCE via Expression Injection in n8n</title>
    <link>https://www.resecurity.com/blog/article/cve-2025-68613-remote-code-execution-via-expression-injection-in-n8n-2</link>
    <guid isPermaLink="true">https://www.resecurity.com/blog/article/cve-2025-68613-remote-code-execution-via-expression-injection-in-n8n-2</guid>
    <description>CVE-2025-68613: RCE via Expression Injection in n8n</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:11 +0000</pubDate>
  </item>
  <item>
    <title>Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025</title>
    <link>https://thehackernews.com/2026/04/adobe-reader-zero-day-exploited-via.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/04/adobe-reader-zero-day-exploited-via.html</guid>
    <description>Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:10 +0000</pubDate>
  </item>
  <item>
    <title>WWBN AVideo RCE via Persistent PHP File Upload (CVE-2026-33717)</title>
    <link>https://www.thehackerwire.com/wwbn-avideo-rce-via-persistent-php-file-upload-cve-2026-33717/</link>
    <guid isPermaLink="true">https://www.thehackerwire.com/wwbn-avideo-rce-via-persistent-php-file-upload-cve-2026-33717/</guid>
    <description>WWBN AVideo RCE via Persistent PHP File Upload (CVE-2026-33717)</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:09 +0000</pubDate>
  </item>
  <item>
    <title>Explorance Blue RCE via Unrestricted File Upload</title>
    <link>https://www.thehackerwire.com/explorance-blue-rce-via-unrestricted-file-upload/</link>
    <guid isPermaLink="true">https://www.thehackerwire.com/explorance-blue-rce-via-unrestricted-file-upload/</guid>
    <description>Explorance Blue RCE via Unrestricted File Upload</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:09 +0000</pubDate>
  </item>
  <item>
    <title>From Pre-Auth SSRF to RCE in TruFusion Enterprise</title>
    <link>https://www.rcesecurity.com/2026/02/when-audits-fail-from-pre-auth-ssrf-to-rce-in-trufusion-enterprise/</link>
    <guid isPermaLink="true">https://www.rcesecurity.com/2026/02/when-audits-fail-from-pre-auth-ssrf-to-rce-in-trufusion-enterprise/</guid>
    <description>From Pre-Auth SSRF to RCE in TruFusion Enterprise</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:08 +0000</pubDate>
  </item>
  <item>
    <title>Serverless Security Risks 2026: Mitigating SSRF and RCE Threats</title>
    <link>https://blog.qualys.com/product-tech/2026/01/15/serverless-security-risks-identity-ssrf-rce</link>
    <guid isPermaLink="true">https://blog.qualys.com/product-tech/2026/01/15/serverless-security-risks-identity-ssrf-rce</guid>
    <description>Serverless Security Risks 2026: Mitigating SSRF and RCE Threats</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:07 +0000</pubDate>
  </item>
  <item>
    <title>Intigriti Challenge: SSRF to RCE via File Upload Bypass</title>
    <link>https://sanderwind.medium.com/intigriti-1025-challenge-ssrf-to-rce-via-file-upload-bypass-8aaa0164ee55</link>
    <guid isPermaLink="true">https://sanderwind.medium.com/intigriti-1025-challenge-ssrf-to-rce-via-file-upload-bypass-8aaa0164ee55</guid>
    <description>Intigriti Challenge: SSRF to RCE via File Upload Bypass</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:07 +0000</pubDate>
  </item>
  <item>
    <title>Precurio Intranet Portal: CSRF to RCE via File Upload</title>
    <link>https://www.thehackerwire.com/precurio-intranet-portal-4-4-csrf-to-rce-via-file-upload/</link>
    <guid isPermaLink="true">https://www.thehackerwire.com/precurio-intranet-portal-4-4-csrf-to-rce-via-file-upload/</guid>
    <description>Precurio Intranet Portal: CSRF to RCE via File Upload</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:06 +0000</pubDate>
  </item>
  <item>
    <title>Tiandy Easy7 RCE via OS Command Injection (CVE-2026-4585)</title>
    <link>https://www.thehackerwire.com/tiandy-easy7-rce-via-os-command-injection-cve-2026-4585/</link>
    <guid isPermaLink="true">https://www.thehackerwire.com/tiandy-easy7-rce-via-os-command-injection-cve-2026-4585/</guid>
    <description>Tiandy Easy7 RCE via OS Command Injection (CVE-2026-4585)</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:05 +0000</pubDate>
  </item>
  <item>
    <title>OpenMetadata RCE via SSTI in FreeMarker Email Templates</title>
    <link>https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-5f29-2333-h9c7</link>
    <guid isPermaLink="true">https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-5f29-2333-h9c7</guid>
    <description>OpenMetadata RCE via SSTI in FreeMarker Email Templates</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:04 +0000</pubDate>
  </item>
  <item>
    <title>RCE in Airbyte via Server-Side Template Injection (SSTI)</title>
    <link>https://github.com/airbytehq/airbyte/security/advisories/GHSA-4j3c-fgvx-xgqq</link>
    <guid isPermaLink="true">https://github.com/airbytehq/airbyte/security/advisories/GHSA-4j3c-fgvx-xgqq</guid>
    <description>RCE in Airbyte via Server-Side Template Injection (SSTI)</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:38:04 +0000</pubDate>
  </item>
  <item>
    <title>File Upload Vulnerability Testing: Bypassing Filters and Getting RCE</title>
    <link>https://payloadplayground.com/blog/file-upload-vulnerability-testing-bypass-rce</link>
    <guid isPermaLink="true">https://payloadplayground.com/blog/file-upload-vulnerability-testing-bypass-rce</guid>
    <description>File Upload Vulnerability Testing: Bypassing Filters and Getting RCE</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:55 +0000</pubDate>
  </item>
  <item>
    <title>Critical LFI to RCE in WP Ghost Plugin Affecting 200k+ Sites</title>
    <link>https://patchstack.com/articles/critical-lfi-to-rce-vulnerability-in-wp-ghost-plugin-affecting-200k-sites/</link>
    <guid isPermaLink="true">https://patchstack.com/articles/critical-lfi-to-rce-vulnerability-in-wp-ghost-plugin-affecting-200k-sites/</guid>
    <description>Critical LFI to RCE in WP Ghost Plugin Affecting 200k+ Sites</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:54 +0000</pubDate>
  </item>
  <item>
    <title>AI Workflows Under Fire: Critical RCE Flaws in Langflow</title>
    <link>https://securityonline.info/critical-langflow-vulnerabilities-rce-file-write-cve-2026-33017/</link>
    <guid isPermaLink="true">https://securityonline.info/critical-langflow-vulnerabilities-rce-file-write-cve-2026-33017/</guid>
    <description>AI Workflows Under Fire: Critical RCE Flaws in Langflow</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:54 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-22812: RCE on a 71k-Star AI Coding Tool With Zero Auth</title>
    <link>https://medium.com/@dhxrxx/cve-2026-22812-how-i-got-rce-on-a-71k-star-ai-coding-tool-with-zero-authentication-7524fbc3317f</link>
    <guid isPermaLink="true">https://medium.com/@dhxrxx/cve-2026-22812-how-i-got-rce-on-a-71k-star-ai-coding-tool-with-zero-authentication-7524fbc3317f</guid>
    <description>CVE-2026-22812: RCE on a 71k-Star AI Coding Tool With Zero Auth</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:53 +0000</pubDate>
  </item>
  <item>
    <title>Root in One Request: Marimo&#x27;s Critical Pre-Auth RCE (CVE-2026-39987)</title>
    <link>https://www.endorlabs.com/learn/root-in-one-request-marimos-critical-pre-auth-rce-cve-2026-39987</link>
    <guid isPermaLink="true">https://www.endorlabs.com/learn/root-in-one-request-marimos-critical-pre-auth-rce-cve-2026-39987</guid>
    <description>Root in One Request: Marimo&#x27;s Critical Pre-Auth RCE (CVE-2026-39987)</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:52 +0000</pubDate>
  </item>
  <item>
    <title>Lessons From 2025: Zero-Day Exploitation Shaping 2026</title>
    <link>https://outpost24.com/blog/top-zero-day-exploits-2025/</link>
    <guid isPermaLink="true">https://outpost24.com/blog/top-zero-day-exploits-2025/</guid>
    <description>Lessons From 2025: Zero-Day Exploitation Shaping 2026</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:51 +0000</pubDate>
  </item>
  <item>
    <title>Critical Zero-Day RCE in Networking Devices Exposes 70,000+ Hosts</title>
    <link>https://gbhackers.com/critical-zero-day-rce-flaw-in-networking-devices/</link>
    <guid isPermaLink="true">https://gbhackers.com/critical-zero-day-rce-flaw-in-networking-devices/</guid>
    <description>Critical Zero-Day RCE in Networking Devices Exposes 70,000+ Hosts</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:51 +0000</pubDate>
  </item>
  <item>
    <title>Cisco Patches Zero-Day RCE Exploited by China-Linked APT</title>
    <link>https://thehackernews.com/2026/01/cisco-patches-zero-day-rce-exploited-by.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/01/cisco-patches-zero-day-rce-exploited-by.html</guid>
    <description>Cisco Patches Zero-Day RCE Exploited by China-Linked APT</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:50 +0000</pubDate>
  </item>
  <item>
    <title>Critical Redis RCE Vulnerability: CVE-2025-49844</title>
    <link>https://www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844</link>
    <guid isPermaLink="true">https://www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844</guid>
    <description>Critical Redis RCE Vulnerability: CVE-2025-49844</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:49 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-59287: WSUS Unauthenticated RCE Vulnerability</title>
    <link>https://www.picussecurity.com/resource/blog/cve-2025-59287-explained-wsus-unauthenticated-rce-vulnerability</link>
    <guid isPermaLink="true">https://www.picussecurity.com/resource/blog/cve-2025-59287-explained-wsus-unauthenticated-rce-vulnerability</guid>
    <description>CVE-2025-59287: WSUS Unauthenticated RCE Vulnerability</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:48 +0000</pubDate>
  </item>
  <item>
    <title>Ivanti EPMM RCE Vulnerability Chain Exploited in the Wild</title>
    <link>https://www.wiz.io/blog/ivanti-epmm-rce-vulnerability-chain-cve-2025-4427-cve-2025-4428</link>
    <guid isPermaLink="true">https://www.wiz.io/blog/ivanti-epmm-rce-vulnerability-chain-cve-2025-4427-cve-2025-4428</guid>
    <description>Ivanti EPMM RCE Vulnerability Chain Exploited in the Wild</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:48 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-34291: Critical Account Takeover and RCE in Langflow</title>
    <link>https://www.obsidiansecurity.com/blog/cve-2025-34291-critical-account-takeover-and-rce-vulnerability-in-the-langflow-ai-agent-workflow-platform</link>
    <guid isPermaLink="true">https://www.obsidiansecurity.com/blog/cve-2025-34291-critical-account-takeover-and-rce-vulnerability-in-the-langflow-ai-agent-workflow-platform</guid>
    <description>CVE-2025-34291: Critical Account Takeover and RCE in Langflow</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:47 +0000</pubDate>
  </item>
  <item>
    <title>50,000+ WordPress Sites at Risk from Critical Ninja Forms RCE</title>
    <link>https://cyberpress.org/ninja-forms-rce-flaw/</link>
    <guid isPermaLink="true">https://cyberpress.org/ninja-forms-rce-flaw/</guid>
    <description>50,000+ WordPress Sites at Risk from Critical Ninja Forms RCE</description>
    <category>RCE</category>
    <pubDate>Fri, 10 Apr 2026 01:36:46 +0000</pubDate>
  </item>
</channel>
</rss>