Metro4Shell: Critical React Native CLI Vulnerability Actively Exploited Against Developers
CVE-2025-11953 in React Native CLI's Metro Development Server is being exploited in the wild to deploy Rust-based malware on developer systems, with attacks observed since December 2025.
New n8n Vulnerability CVE-2026-25049 Bypasses Previous Patch to Enable Remote Code Execution
A critical flaw in n8n (CVSS 9.4) exploits TypeScript/JavaScript type mismatch to bypass sanitization from a December 2025 patch, enabling authenticated remote command execution via webhook workflows.
DockerDash Vulnerability in Ask Gordon AI Enables Code Execution via Image Metadata
Noma Labs discovered a critical flaw in Docker's Ask Gordon AI assistant allowing attackers to hijack AI reasoning through malicious image metadata, leading to remote code execution or data exfiltration.
Critical vLLM Vulnerability Lets Attackers Hijack AI Servers via Video Link
CVE-2026-22778, a critical RCE in vLLM versions 0.8.3-0.14.0, chains a PIL information leak with a JPEG2000 heap overflow to achieve code execution through a malicious video link.
New n8n Sandbox Escape Vulnerabilities Allow Remote Code Execution
JFrog discovered two sandbox escape flaws in n8n: CVE-2026-1470 (CVSS 9.9) bypasses JavaScript sandboxing via deprecated 'with' statement, and CVE-2026-0863 (CVSS 8.5) escapes Python restrictions via AttributeError.obj.
Ivanti EPMM Zero-Days Chained for Unauthenticated RCE, Already Exploited in the Wild
Two chained Ivanti EPMM vulnerabilities (CVE-2026-1281 and CVE-2026-1340, both CVSS 9.8) allow unauthenticated RCE via Bash command injection. CISA gave federal agencies only 3 days to patch.
SolarWinds Patches Critical RCE and Auth Bypass Flaws in Web Help Desk
Four critical vulnerabilities in SolarWinds Web Help Desk allow unauthenticated remote code execution and authentication bypass. CISA confirms active exploitation with February 6 federal deadline.
Fortinet Patches FortiCloud SSO Authentication Bypass Under Active Exploitation
CVE-2026-24858 allows attackers with any FortiCloud account to authenticate to other customers' devices. Arctic Wolf observed automated exploitation creating backdoor admin accounts within seconds.
Critical 'Cellbreak' Vulnerability in Grist Spreadsheet Platform Enables RCE
CVE-2026-24002 allows remote code execution through malicious spreadsheet formulas via Pyodide sandbox escape. Affects government, education, and enterprise deployments.
Critical Kubernetes Vulnerability Allows Container Escape and Full Cluster Takeover
CVE-2026-1483 rated CVSS 9.8 enables attackers with pod creation privileges to escape containers and seize control of entire clusters. CISA added to KEV catalog; exploitation observed within 48 hours of disclosure.
WhatsApp Zero-Click Exploit Spreads Malware Through Group Chats
A WhatsApp vulnerability allows attackers to compromise devices by sending malicious PDF files to group chats without user interaction. Paragon Solutions' spyware exploited the flaw against 90+ targets including journalists and civil society members.
Microsoft Patches Actively Exploited Office Zero-Day Used by APT28
CVE-2026-21509 bypasses OLE security mitigations in Microsoft Office. Russia-linked APT28 is exploiting it against targets in Ukraine and the EU. Emergency patches available.
Oracle January 2026 Critical Patch Update Addresses 337 Vulnerabilities
Massive security update includes patches across 122 products with two CVSS 10.0 flaws. Java SE receives 11 remotely exploitable patches, and Financial Services Applications have 33 unauthenticated attack vectors.
Redis RCE Vulnerability Exploitable Despite Authentication — Upgrade to 8.3.2
CVE-2025-62507 is a stack buffer overflow in Redis 8.2's XACKDEL command. JFrog researchers demonstrated full remote code execution is achievable, contradicting the initial 'authentication required' assessment.
Critical WordPress Plugin Vulnerability Actively Exploited in the Wild
CVE-2026-23550 in Modular DS plugin scores maximum CVSS 10.0, enabling unauthenticated privilege escalation. Attacks began January 13 targeting 40,000+ installations.
Critical n8n Workflow Automation Flaw Allows Remote Code Execution
CVE-2026-21858 'Ni8mare' (CVSS 10.0) enables unauthenticated attackers to read files, bypass authentication, and execute commands on n8n servers through a Content-Type confusion flaw.
Critical D-Link Router Vulnerability Actively Exploited for Remote Code Execution
CVE-2026-0625 enables unauthenticated remote code execution on legacy D-Link DSL, DIR, and DNS devices via command injection. Attacks observed since November 2025; no patch available for end-of-life devices.