appsec.fyi

Remote Code Execution (RCE) Resources

Post Share

A curated AppSec resource library covering XSS, SQLi, SSRF, IDOR, RCE, XXE, OSINT, and more.

Remote Code Execution (RCE)

Remote Code Execution (RCE) is the ability for an attacker to execute arbitrary commands or code on a target machine or process. RCE vulnerabilities represent the most critical class of security bugs — they give an attacker the same level of control as a system administrator.

RCE can manifest through many different attack vectors. Command injection occurs when user input is passed unsanitized to system shell commands. Deserialization attacks exploit unsafe object reconstruction in languages like Java, PHP, Python, and .NET. Server-Side Template Injection (SSTI) allows code execution through template engines like Jinja2, Twig, or Freemarker. File upload vulnerabilities can lead to RCE when executable files bypass upload filters and are served by the web server.

In modern applications, RCE often appears in less obvious places: expression language injection in Java frameworks, prototype pollution leading to code execution in Node.js, unsafe use of eval() or dynamic code loading, and vulnerabilities in PDF generators, image processors, and other libraries that shell out to system commands.

RCE bugs consistently command the highest payouts in bug bounty programs because the impact is total system compromise. Chaining lower-severity bugs into RCE — such as SSRF to cloud metadata to code execution — is a common and highly rewarded approach.

This page collects RCE techniques, exploitation writeups, and research across all major platforms and languages.

From Wikipedia

Date Added Link Excerpt
2026-04-30 NEW 2026GitHub Flaw Enables Remote Code Execution With a Single Git Push newsWriteup detailing CVE-2026-3854, a vulnerability in GitHub's internal git protocol allowing authenticated users to achieve remote code execution. Exploitation leveraged an injection flaw in the X-Stat header, where semicolon-delimited options, unsanitized by GitHub, could override security controls via a "last-write-wins" parsing model. This flaw affected both GitHub.com and GitHub Enterprise Server, potentially leading to repository compromise and server takeover. Mitigation involves upgrading GHES, enforcing least privilege, monitoring git activity, and hardening configurations. → esecurityplanet.com
2026-04-30 NEW 2026Critical GitHub RCE bug exposed millions of repositories newsWriteup of CVE-2026-3854, a critical RCE vulnerability in GitHub affecting millions of repositories. Exploiting the handling of server-side "git push" operations, specifically the X-STAT component, an authenticated user could execute arbitrary commands via crafted input. This command injection flaw, rated CVSS 8.8, was discoverable using AI-augmented tooling like IDA MCP, and impacted GitHub.com and Enterprise Server, granting full server compromise in self-hosted environments.
2026-04-29 NEW 2026GitHub vulnerability CVE-2026-3854 allows code execution with a single git push newsAnalysis of CVE-2026-3854, a critical GitHub vulnerability allowing remote code execution. This command injection flaw, discovered by Wiz researchers, affects GitHub Enterprise Cloud and Server, enabling attackers with push access to execute arbitrary commands by exploiting unsanitized push option values. The vulnerability, patched by GitHub within two hours, could lead to system compromise and exposure of repositories on GitHub.com, with many instances remaining vulnerable. → scworld.com
2026-04-29 NEW 2026Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining newsLibrary for securing the Qinglong open-source task scheduler, addressing CVE-2026-3965 and CVE-2026-4047. These vulnerabilities, stemming from authentication bypass and path traversal flaws in versions 2.20.1 and older, allow for remote code execution. Attackers have been exploiting these issues to deploy cryptominers, disguised by the process name '.fullgc,' on developer servers by injecting shell commands into `config.sh` and downloading binaries from `file.551911.xyz`. → bleepingcomputer.com
2026-04-29 NEW 2026AI Finds 38 Security Flaws in OpenEMR news AIAn AI security tool, DeepScribe, has identified 38 vulnerabilities in OpenEMR, a popular open-source electronic health record system. These flaws range in severity, with DeepScribe flagging 10 as critical. The company plans to disclose these findings responsibly to OpenEMR's development team. This discovery highlights the potential of AI in uncovering security weaknesses in complex software. The specific bounty payout amount for this discovery is not mentioned. → darkreading.com
2026-04-29 NEW 2026Hugging Face LeRobot Vulnerability Enables Unauthenticated RCE Attacks newsA critical vulnerability in Hugging Face's LeRobot library allows unauthenticated remote code execution (RCE) attacks. Attackers can exploit this flaw to compromise systems without needing any prior authentication. This could lead to significant security breaches. The report does not mention a specific bug bounty payout amount. → cybersecuritynews.com
2026-04-29 NEW 2026Critical Cursor Vulnerability Exposes Developer Workstations To Remote Code Execution newsA critical vulnerability has been discovered that allows remote code execution on developer workstations. The flaw, related to cursor handling, poses a significant security risk, enabling attackers to compromise sensitive developer environments. This could lead to widespread data breaches and the theft of proprietary code. Further details are available via the provided link. → cyberpress.org
2026-04-29 NEW 2026Critical Chrome Vulnerabilities Enables Remote Code Execution Attacks newsCritical vulnerabilities in Google Chrome have been discovered, posing a significant security risk. These flaws allow for remote code execution (RCE) attacks, meaning malicious actors could potentially run unauthorized code on a user's system without their direct interaction. This could lead to data theft, system compromise, or other harmful actions. Users are strongly advised to ensure their Chrome browsers are updated to the latest version to patch these critical security holes and protect themselves from potential exploitation. No specific bounty payout amount was mentioned in the provided content. → cybersecuritynews.com
2026-04-29 NEW 2026LeRobot Vulnerability Enables Unauthenticated Remote Code Execution news PythonA critical vulnerability in LeRobot has been discovered, allowing unauthenticated remote code execution (RCE). This means an attacker can compromise systems without needing any login credentials. The exploit leverages flaws in the robot's software to gain unauthorized control, posing a significant security risk. Further details on the specific exploit can be found via the provided link. The potential impact includes data breaches, system manipulation, and denial-of-service attacks. → letsdatascience.com
2026-04-29 NEW 2026GitHub fixes RCE flaw that gave access to millions of private repos news Supply ChainWriteup of CVE-2026-3854, a critical RCE vulnerability affecting GitHub.com and GitHub Enterprise Server, allowing attackers with push access to gain read/write access to millions of private repositories. The flaw stems from unsanitized user-supplied options during 'git push' operations, enabling arbitrary code execution and potential server compromise. Administrators of GitHub Enterprise Server instances are urged to upgrade immediately, as a significant percentage remain vulnerable. → bleepingcomputer.com
2026-04-29 NEW 2026Cursor AI Vulnerability Enables Remote Code Execution news AIA security researcher discovered a critical vulnerability in Cursor AI that allows for remote code execution. This exploit could enable attackers to gain unauthorized access and control over affected systems. The vulnerability's nature suggests a significant security risk, potentially impacting users of the AI platform. Further details regarding the specific exploit mechanism and potential mitigations were not provided in the initial announcement. → letsdatascience.com
2026-04-29 NEW 2026Critical GitHub RCE bug exposed millions of repositories news Supply ChainWriteup of CVE-2026-3854, a critical command injection vulnerability in GitHub's Git push processing, specifically within the X-STAT component. This flaw, found by Wiz researchers using AI-augmented tooling, allowed authenticated users to execute arbitrary commands server-side, leading to potential remote code execution and full compromise of GitHub Enterprise Server instances, exposing millions of repositories. Patches were released for GitHub.com and Enterprise Server. → csoonline.com
2026-04-29 NEW 2026Cursor AI IDE vulnerability allows code execution via hidden Git hooks news Supply ChainTool for arbitrary code execution in Cursor AI IDE. CVE-2026-26268, a high-severity vulnerability (CVSS 8.1), leverages hidden Git hooks within nested bare repositories. The Cursor AI agent, when performing tasks like `git checkout`, inadvertently triggers these malicious pre-commit hooks, allowing attackers to execute arbitrary code without user interaction. This exploit targets the autonomous nature of AI agents operating on untrusted code, posing a significant risk to developer machines holding sensitive data. → hackread.com
2026-04-29 NEW 2026Critical GitHub Vulnerability Exposed Millions of Repositories news Supply ChainWriteup of CVE-2026-3854, a critical remote code execution flaw in GitHub's internal Git infrastructure. This injection vulnerability allowed authenticated users to execute arbitrary commands on backend servers via a simple `git push` command, potentially compromising millions of repositories on GitHub Enterprise Server and GitHub.com. Wiz researchers discovered the issue, which affected various GitHub Enterprise offerings, and a patch was subsequently released. → securityweek.com
2026-04-29 NEW 2026GitHub.com and Enterprise Server Vulnerability Allows Remote Code Execution news Supply ChainA critical vulnerability affecting GitHub.com and GitHub Enterprise Server allows for remote code execution (RCE). This means attackers could potentially run arbitrary code on vulnerable systems without needing prior authentication. The severity of this flaw necessitates prompt patching by affected users. Specific details about exploitation or the impact of the vulnerability are limited, but RCE flaws are generally considered high-risk due to their potential for complete system compromise. → gbhackers.com
2026-04-29 NEW 2026Critical Google Chrome Flaws Allow Remote Code Execution Exploits newsGoogle Chrome is facing critical vulnerabilities that could allow for remote code execution. These security flaws, if exploited, could enable attackers to compromise user systems without any interaction required from the user. The severity of these issues highlights the ongoing need for prompt patching and vigilant security practices for web browsers. No specific bounty payout amounts were mentioned in the provided content. → cyberpress.org
2026-04-29 NEW 2026Mozilla Firefox Multiple Vulnerabilities newsLibrary of advisories detailing multiple vulnerabilities in Mozilla Firefox. These issues, impacting versions prior to Firefox 150.0.1, Firefox ESR 115.35.1, and Firefox ESR 140.10.1, can lead to remote code execution, security restriction bypass, and information disclosure. Patches are available from the vendor. → hkcert.org
2026-04-29 NEW 2026GitHub patches critical 'git push' remote code execution bug newsWriteup on a critical vulnerability in GitHub's `git push` command, allowing authenticated users to achieve remote code execution on backend infrastructure. Discovered by Wiz researchers using IDA's MCP server, the flaw exploited GitHub's internal protocol by adding malicious options to the `git push` command. GitHub patched the issue on GitHub.com and released a fix for GitHub Enterprise Server.
2026-04-28 NEW 2026Major Security Flaw In GitHub Enables Remote Code Execution Across Millions of Repositories newsA significant security vulnerability has been discovered in GitHub that could allow for remote code execution across millions of repositories. This flaw, if exploited, could have widespread implications for developers and organizations relying on GitHub for code hosting and collaboration. The exact impact and potential severity are still being assessed, but the discovery highlights the ongoing challenges in securing large-scale software development platforms. Further details on the vulnerability are expected to be released as the situation unfolds and mitigation efforts are implemented.
2026-04-28 NEW 2026CVE-2026-3854 GitHub flaw enables remote code execution newsWriteup of CVE-2026-3854, a critical command injection vulnerability in GitHub Enterprise allowing remote code execution. Exploitable via a crafted git push, attackers can inject malicious metadata, bypass sandbox protections, and run arbitrary commands. Wiz researchers reported the flaw, which GitHub fixed with patches for Enterprise Server versions. The vulnerability underscores risks in inter-service communication and sanitization of user-controlled data in complex systems. → securityaffairs.com
2026-04-28 NEW 2026GitHub RCE Vulnerability: CVE-2026-3854 Breakdown newsTool for analyzing CVE-2026-3854, a critical RCE vulnerability in GitHub's internal git infrastructure. This flaw, exploitable via a single git push from an authenticated user, allowed arbitrary command execution on GitHub.com's backend servers, potentially exposing millions of repositories. On GitHub Enterprise Server, it granted full server compromise. The analysis details the X-Stat header injection flaw and the exploitation chain involving `rails_env`, `custom_hooks_dir`, and `repo_pre_receive_hooks` fields to bypass sandboxing and achieve remote code execution. → wiz.io
2026-04-28 NEW 2026Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push news Supply ChainWriteup of CVE-2026-3854, a critical command injection vulnerability in GitHub.com and GitHub Enterprise Server. Exploitable via a single "git push" command, this flaw allows authenticated users with push access to achieve remote code execution by injecting malicious metadata into internal service headers. Researchers from Wiz demonstrated a technique chaining three injections to bypass sandboxing, redirect hooks, and execute arbitrary commands as the git user, potentially leading to cross-tenant repository exposure on GitHub.com. → thehackernews.com
2026-04-28 NEW 2026Critical GitHub.com and Enterprise Server RCE Vulnerability Enables Full Server Compromise news Supply ChainA critical Remote Code Execution (RCE) vulnerability has been discovered in GitHub.com and GitHub Enterprise Server. This flaw allows attackers to achieve full server compromise. The vulnerability's details have been shared via a link, but no specific payout amount for reporting it has been mentioned. This discovery highlights a significant security risk for users and organizations relying on GitHub's platforms. → cybersecuritynews.com
2026-04-28 NEW 2026Securing the git push pipeline: Responding to a critical remote code execution vulnerability intermediate Supply ChainWriteup of CVE-2026-3854, a critical remote code execution vulnerability in GitHub's `git push` pipeline. The vulnerability allowed arbitrary command execution on the server by crafting a `git push` command with unsanitized push options that manipulated internal metadata, bypassing sandboxing. GitHub deployed a fix within hours to github.com and released patches for GitHub Enterprise Server, recommending immediate upgrades. The investigation found no evidence of exploitation. → github.blog
2026-04-28 NEW 2026Hugging Face LeRobot Vulnerability Enables Unauthenticated Remote Code Execution Attacks news Supply ChainA critical vulnerability, CVE-2024-31586, has been discovered in Hugging Face's LeRobot library. This flaw allows unauthenticated attackers to execute arbitrary code remotely on vulnerable systems. The vulnerability stems from LeRobot's insecure handling of certain files, specifically when unpacking archives. Exploitation is possible without prior authentication. → cyberpress.org
2026-04-28 NEW 2026Hugging Face LeRobot Flaw Opens Door to Remote Code Execution Attacks news Supply ChainA critical vulnerability has been discovered in Hugging Face's LeRobot library, potentially allowing remote code execution. The flaw, detailed in a security advisory, enables attackers to exploit the library to gain unauthorized control over systems. This discovery highlights significant security risks for users and developers relying on LeRobot. No specific bounty payout amount was mentioned in the provided content. → gbhackers.com
2026-04-28 NEW 2026Critical Cursor bug could turn routine Git into RCE news Supply ChainLibrary for securing AI-augmented IDEs against RCE vulnerabilities, exemplified by CVE-2026-26268 in Cursor IDE. This flaw, which allowed arbitrary code execution via malicious Git repositories and AI agent interaction with Git hooks and bare repositories, is patched in Cursor version 2.5. The exploit leverages Git's documented features, making detection challenging due to its integration into normal development workflows. → csoonline.com
2026-04-28 NEW 2026Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE newsWriteup on CVE-2026-25874, a critical unauthenticated RCE vulnerability in Hugging Face's LeRobot platform. The flaw, found in version 0.4.3, stems from unsafe data deserialization using Python's pickle format within the async inference pipeline, allowing attackers to execute arbitrary code via gRPC calls. This impacts the PolicyServer and robot client components, potentially leading to network compromise, data theft, and safety risks. A fix is planned for version 0.6.0. → thehackernews.com
2026-04-28 NEW 2026Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202 newsWriteup on CVE-2026-32202, a Windows Shell spoofing vulnerability actively exploited in the wild. This zero-click flaw, with a CVSS score of 4.3, stems from an incomplete patch for CVE-2026-21510 and allows attackers to steal Net-NTLMv2 hashes via SMB connections. Russian nation-state group APT28 reportedly used it in conjunction with CVE-2026-21513, leveraging malicious LNK files to bypass Microsoft Defender SmartScreen and achieve credential theft. → thehackernews.com
2026-04-27 NEW 2026Critical Gemini CLI Vulnerability Enables Remote Code Execution Attacks newsA critical vulnerability in the Gemini Command Line Interface (CLI) has been discovered, posing a significant security risk. This flaw allows for Remote Code Execution (RCE) attacks, meaning attackers could potentially run arbitrary code on a user's system without their knowledge or consent. This could lead to data breaches, system compromise, and other malicious activities. Users are strongly advised to update their Gemini CLI to the latest version to patch this vulnerability. → cybersecuritynews.com
2026-04-27 NEW 2026Nessus Agent Vulnerability on Windows Allows Arbitrary Code Execution as SYSTEM newsA critical vulnerability has been discovered in the Nessus Agent on Windows, allowing for arbitrary code execution with SYSTEM privileges. This means an attacker could potentially gain full control of a vulnerable system. The vulnerability, detailed in the provided link, is significant due to the high level of access it grants. Details regarding specific affected versions or mitigation steps are not provided in this summary. → cyberpress.org
2026-04-27 NEW 2026Critical Gemini CLI Vulnerability Enables Remote Code Execution Attacks newsA critical vulnerability has been discovered in the Gemini Command Line Interface (CLI) that allows for remote code execution (RCE) attacks. This means attackers could potentially run malicious code on a user's system without their knowledge or consent by exploiting this flaw in the Gemini CLI. Further details about the exploit and its potential impact are available at the provided link. → cyberpress.org
2026-04-27 NEW 2026PoC Exploit Released for Critical Metabase Enterprise RCE Vulnerability newsA Proof-of-Concept (PoC) exploit has been released for a critical Remote Code Execution (RCE) vulnerability affecting Metabase Enterprise. This vulnerability allows unauthenticated attackers to gain control of affected servers. The release of the PoC significantly increases the risk of exploitation, as it provides a direct method for malicious actors to test and execute attacks. Users of Metabase Enterprise are strongly advised to update their systems immediately to patch this severe security flaw and mitigate potential damage. → cyberpress.org
2026-04-27 NEW 2026Critical Gemini CLI Flaw Raises Supply Chain Security Concerns news Supply ChainA critical flaw in the Gemini Command Line Interface (CLI) has been discovered, posing significant supply chain security risks. This vulnerability could allow attackers to compromise systems that use the Gemini CLI. The exact payout amount for the bug bounty is not stated in the provided content. This discovery highlights the ongoing importance of robust security practices within software development pipelines. → gbhackers.com
2026-04-27 NEW 2026Metabase Enterprise RCE Flaw Now Has Public Proof-of-Concept Exploit newsA critical Remote Code Execution (RCE) vulnerability has been discovered in Metabase Enterprise. A public proof-of-concept (PoC) exploit is now available, meaning attackers can leverage this flaw to compromise Metabase instances. This poses a significant security risk for organizations using the affected enterprise version. Users are strongly advised to update to the latest version to patch this vulnerability. No specific bounty payout amount was mentioned. → gbhackers.com
2026-04-27 NEW 2026Nessus Agent Vulnerability on Windows Enables Arbitrary Code Execution with SYSTEM Privileges newsA critical vulnerability has been discovered in Nessus Agents on Windows, allowing for arbitrary code execution with SYSTEM privileges. This means an attacker could potentially gain complete control over a vulnerable system. The vulnerability, detailed in a linked report, highlights a significant security risk for organizations using Nessus Agents. No specific bounty payout amount is mentioned in the provided content. → cybersecuritynews.com
2026-04-26 NEW 2026Anthropic's model context protocol includes a critical remote code execution vulnerability news AIA critical remote code execution (RCE) vulnerability has been discovered in Anthropic's model context protocol. This flaw allows attackers to execute arbitrary code on a system through the protocol. The specifics of the vulnerability and its potential impact are detailed in the linked article, but no bug bounty payout amount is mentioned. → msn.com
2026-04-24 2026Microsofts April Security Update of High-Risk Vulnerability Notice for Multiple Products newsMicrosoft's April Security Update addresses high-risk vulnerabilities across multiple products. The notice, detailed in a linked article, highlights critical security flaws requiring immediate attention for users of affected Microsoft software. While the article itself does not specify a bug bounty payout, the update aims to patch these significant security risks to protect users from potential exploitation. → securityboulevard.com
2026-04-24 2026Hackers exploit file upload bug in Breeze Cache WordPress plugin newsLibrary for detecting and preventing arbitrary file uploads, specifically addressing CVE-2026-3844 in the Breeze Cache WordPress plugin. This critical vulnerability, with a severity score of 9.8, allows unauthenticated attackers to achieve remote code execution (RCE) by exploiting a missing file-type validation in the ‘fetch_gravatar_from_remote’ function when the “Host Files Locally - Gravatars” add-on is enabled. Versions up to 2.4.4 are affected. → bleepingcomputer.com
2026-04-24 2026Tenable Research Uncovers Remote Code Execution Vulnerability in Microsoft GitHub Repository Exposing CI/CD Pipeline to Unauthorized Code Execution news Supply ChainAnalysis of a critical Remote Code Execution vulnerability (CVSSv4 9.3) in a Microsoft GitHub repository, specifically within its CI/CD workflow using GitHub Actions. Attackers could inject malicious Python code into issue descriptions, triggering automatic execution on the GitHub runner and exfiltrating sensitive secrets like GITHUB_TOKEN, thereby compromising the software supply chain and potentially allowing unauthorized code execution. → cxodigitalpulse.com
2026-04-24 202620th April Threat Intelligence Report newsLibrary of threat intelligence covering the week of April 20th, detailing data breaches at Booking.com and McGraw-Hill, supply chain compromise of EssentialPlugin, and Basic-Fit. AI threats include weaponized Claude Code and GPT-4 for government breaches, phishing campaigns impersonating Claude AI, and prompt injection on GitHub agents. Vulnerabilities addressed include Apache ActiveMQ CVE-2026-34197, Splunk CVE-2026-20204, Microsoft Defender CVE-2026-33825, and Windows Task Host CVE-2025-60710. Other intelligence covers brand impersonation phishing, ZionSiphon malware targeting industrial control, Russian C2 infrastructure, and a fake Ledger Live app.
2026-04-23 2026Anthropic's model context protocol includes a critical remote code execution vulnerability newsAnthropic's model context protocol includes a critical remote code execution vulnerability https://ift.tt/uJoCxjU → msn.com
2026-04-22 2026Mozilla Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities newsMozilla Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities https://ift.tt/6dEs8aC → gbhackers.com
2026-04-22 2026Terrarium Sandbox: Critical Vulnerability Allows Root Code newsTerrarium Sandbox: Critical Vulnerability Allows Root Code https://ift.tt/xt7SA8a → secnews.gr
2026-04-22 2026Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities newsFirefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities https://ift.tt/oKqHTf5 → cyberpress.org
2026-04-22 2026Critical SGLang Flaw (CVE-2026-5760) Enables RCE via Malicious AI Models newsWriteup of CVE-2026-5760 in SGLang, a critical flaw enabling remote code execution via malicious AI models. Attackers can craft a GGUF model with a malicious tokenizer.chat_template to exploit an unsandboxed Jinja2 environment, triggering server-side template injection and executing arbitrary Python code. This high-severity vulnerability, requiring no authentication, impacts SGLang deployments serving LLMs. → cxodigitalpulse.com
2026-04-22 2026CVE-2025-68454: Craft CMS Twig SSTI RCE Vulnerability newsWriteup detailing CVE-2025-68454, an authenticated Remote Code Execution vulnerability in Craft CMS versions 5.0.0-RC1 through 5.8.20 and 4.0.0-RC1 through 4.16.16. Exploitation occurs via Server-Side Template Injection (SSTI) using the Twig map filter in text fields within Settings or the System Messages utility. Attackers with administrative privileges or access to System Messages can achieve arbitrary code execution by crafting malicious Twig payloads. Mitigation involves updating to patched versions 5.8.21 or 4.16.17, disabling allowAdminChanges, and restricting access to sensitive utilities. → sentinelone.com
2026-04-22 202615,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652) newsAnalysis of CVE-2025-53652, a critical command injection flaw in the Jenkins Git Parameter plugin, reveals its potential for remote code execution (RCE) on unauthenticated servers. VulnCheck's report details how this vulnerability, present in approximately 15,000 internet-facing Jenkins instances, allows attackers to inject malicious commands. While a patch exists, it can be manually disabled, necessitating detection rules to identify exploitation attempts. → hackread.com
2026-04-22 2026React2Shell (CVE-2025-55182): RSC Flight Decoder Remote Code Execution newsWriteup of CVE-2025-55182, a critical RCE in React Server Components (RSC) that affects frameworks like Next.js. Attackers exploit a flaw in the flight protocol decoding, where improperly handled prototype chain lookups allow arbitrary code execution on the server. The vulnerability stems from not checking for own properties during object deserialization. Mitigation involves upgrading React packages, restricting exposure of RSC routes, and deploying IPS/WAF rules to detect malicious multipart payloads.
2026-04-22 2026Ivanti EPMM: Another Pre-Auth RCE (CVE-2026-1281 and CVE-2026-1340) newsWriteup on CVE-2026-1281 and CVE-2026-1340 in Ivanti EPMM details pre-authentication remote code execution vulnerabilities. Attackers can exploit these by sending crafted requests to run arbitrary code on unpatched instances, as researchers at WatchTowr discovered. Ivanti has released an RPM patch, but it is removed upon version upgrades, requiring reapplication. These vulnerabilities were actively exploited in the wild before disclosure, and public PoC code increases immediate risk.

Frequently Asked Questions

What is remote code execution?
Remote Code Execution (RCE) is a vulnerability that allows an attacker to run arbitrary commands or code on a target system. It is the most critical class of security vulnerability because it gives the attacker the same level of access as the application or server process, often leading to complete system compromise.
What are common RCE attack vectors?
Common vectors include command injection (unsanitized input passed to shell commands), unsafe deserialization (Java, PHP, Python, .NET), Server-Side Template Injection (Jinja2, Twig, Freemarker), file upload bypasses that execute uploaded code, expression language injection in Java frameworks, and prototype pollution in Node.js leading to code execution.
Why does RCE pay the highest bug bounties?
RCE represents total system compromise — an attacker can read all data, modify the application, pivot to internal networks, and potentially access cloud infrastructure. The impact is maximum, so bounty programs consistently pay their highest rewards for RCE findings, often ranging from $10,000 to $100,000+ depending on the target.

Weekly AppSec Digest

Get new resources delivered every Monday.