CVE-2026-24765
Released: January 27, 2026
Last Updated: January 27, 2026
Vendor: PHPUnit / Open Source Project
Attack Tags: Insecure Deserialization, PHP, Automated Testing, DevOps, CI/CD
Severity: High
CVE-2026-24765 is a high-severity vulnerability in PHPUnit where the framework unsafely deserializes code coverage files (.coverage) during PHPT test execution. Deserialization is the process of converting stored data back into PHP objects — but if the data is malicious and not validated properly, this can become a security risk.
In this case:
Unlike normal operation, a .coverage file shouldn’t already exist before tests run — so this anomalous state makes exploitation possible if attackers can put files on the system.
PHPUnit versions prior to the following releases are impacted:
These include production setups where PHPUnit is part of the test suite and CI/CD jobs with code coverage enabled.
So far, there are no widespread reports of public active exploits in the wild. However, this vulnerability is especially relevant in environments where attackers can inject files into repositories or build systems, such as:
Because it enables remote code execution (RCE) during test runs, it’s particularly risky in automated systems that run tests frequently and have access to internal resources.
Unsafe deserialization is a well-known class of vulnerability (CWE-502) that can lead to:
This is especially concerning for development teams and DevOps pipelines where PHPUnit is integrated into automated workflows.
For more details and official entries on this issue:
Security vulnerabilities in testing tools like PHPUnit can impact even the development phase of software delivery. We support teams by offering:
Reach out to strengthen your DevOps security posture and avoid tertiary pipeline compromises.
CVE-2026-24747
Published: 2026-01-27
Severity: Critical
Product: Pytorch
Version affected: < 2.10.0
CWE-502: Deserialization of Untrusted Data
CWE-94: CWE-94: Improper Control of Generation of Code ('Code Injection')
Attack Tags: PyTorch, Python, Machine Learning, Unsafe Deserialization
CVE-2026-24747 is a critical deserialization vulnerability in PyTorch, a widely used Python framework for machine learning and tensor computation. The flaw exists in the ‘weights_only’ unpickler used during model checkpoint loading and can allow attackers to execute arbitrary code when a malicious checkpoint file ‘(.pth)’ is loaded using ‘torch.load()’.
Despite the intended safety controls of the ‘weights_only’ option, a crafted checkpoint file can bypass restrictions, resulting in remote code execution (RCE) in the context of the running application. This makes the vulnerability particularly dangerous in environments where models are loaded automatically or sourced from third parties.
Given PyTorch’s widespread use across AI research, enterprise machine learning platforms, CI/CD pipelines, and cloud-based inference services, CVE-2026-24747 presents a significant supply-chain and operational risk.
Following successful exploitation, attackers have been observed engaging in the following activities:
This vulnerability highlights the increasing risk of treating machine learning models as trusted data, as they can effectively function as executable content.
Modern AI and ML environments require security beyond traditional patching. Our IT Managed Services and Security Operations teams help organizations protect their machine learning workloads by providing:
CVE-2026-0859
Released: January 13, 2026
Last Updated: January 13, 2026
Vendor: TYPO3
Attack Tags: TYPO3 CMS, PHP, Insecure Deserialization, Local Privilege Escalation, Remote Code Execution
Severity: Medium
CVE-2026-0859 is a medium-severity security vulnerability affecting TYPO3 CMS. The issue stems from insecure deserialization in TYPO3’s mailer file spool mechanism, which is used to queue and process outgoing emails.
Due to insufficient validation of serialized data, TYPO3 may process maliciously crafted spool files. If exploited, this can allow attackers with local write access to execute arbitrary PHP code on the web server, potentially leading to full application compromise.
The vulnerability impacts the following TYPO3 CMS versions:
Organizations running these versions should consider themselves at risk until patched.
At the time of disclosure, there is no confirmed large-scale internet exploitation of CVE-2026-0859. However, this vulnerability is highly relevant in post-compromise scenarios, such as:
Once exploited, attackers can escalate privileges and gain persistent control over the TYPO3 environment.
For more detailed technical information and official advisories, refer to the following sources:
Security issues like CVE-2026-0859 highlight the importance of continuous monitoring and proactive patch management.
Our security teams help organizations by providing:
Connect with our security experts to reduce risk and keep your CMS environments secure.
CVE-2025-55182
Released: Nov 29, 2025
CISA added the vulnerability to the Known Exploited Vulnerabilities: Dec 5, 2025
Attack Tags: React.js, JavaScript, Supply Chain, Remote Code Execution
Severity: Critical
React2Shell is a critical remote code execution (RCE) vulnerability affecting React Server Components (RSC) and server-side rendering (SSR) implementations. Tracked as CVE-2025-55182, this flaw enables unauthenticated attackers to execute arbitrary commands on vulnerable servers, making it one of the most severe React security issues observed to date.
Threat actors have actively exploited React2Shell by abusing unsafe deserialization and insecure execution paths in React Server Components. Attackers send crafted HTTP requests to vulnerable React applications, triggering server-side code execution without authentication.
Because React is widely deployed across cloud platforms, microservices architectures, CI/CD pipelines, and developer portals, React2Shell presents a high-impact supply-chain risk. Compromised applications can be weaponized to attack downstream systems, third-party services, and internal infrastructure.
Following successful exploitation, attackers have been observed engaging in the following activities:
Security researchers have observed both mass internet scanning and targeted intrusions, indicating use by financially motivated threat actors as well as more advanced adversaries seeking long-term persistence.
Modern attacks like React2Shell demand more than one-time patching. Our IT Managed Services and Security Operations teams help organizations stay protected by providing: