LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-41679

CVE-2026-41679 - Vulnerability Analysis

CriticalCVSS: 10.0

Last Updated: April 24, 2026

Paperclip - Remote Code Execution

Published: April 23, 2026Updated: April 24, 2026PoC AvailableRemote Exploitable

Overview

Paperclip < 2026.416.0 contains a remote code execution caused by a chain of six unauthenticated API calls in authenticated mode with default configuration, letting unauthenticated attackers execute arbitrary code remotely, exploit requires network access to the target.

Severity & Score

Severity: Critical
CVSS Score: 10.0
EPSS Score: 17.2%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can execute arbitrary code remotely, leading to full system compromise.

Mitigation

Update to version 2026.416.0 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Apr 23, 2026

šŸ”“ CVE-2026-41679 - Critical (10) Paperclip is a Node.js server and React UI that orchestrates a team of AI agents to run a business. Prior to version 2026.416.0, an unauthenticated attacker can achieve full remote code execution on any network-accessible Paperclip instance runnin... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-41679/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-41679
Severity
Critical
CVSS Score
10.0
Type
undefined
Status
unconfirmed
EPSS
17.2%
Social Posts
1

CWE

  • CWE-287

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS Score

17.2%Probability of exploitation in the next 30 days