Vulhub

Vulhub is an open-source collection of pre-built vulnerable docker environments for security researchers and educators.

- Stars- Forks0 Environments
# Clone the repository
git clone --depth 1 https://github.com/vulhub/vulhub.git

# Enter the directory
cd vulhub/spring/CVE-2022-22947

# Start the environment
docker compose up -d

Why Use Vulhub?

Docker Based

All environments are built with Docker and Docker Compose, making them easy to deploy and isolate.

Real Vulnerabilities

Practice with real-world vulnerabilities in a safe, controlled environment for learning and research.

Well Documented

Each vulnerability comes with detailed documentation explaining the vulnerability and exploitation steps.

Latest Environments

View all environments
Path TraversalRCE
Created 5 hours ago

n8n Content-Type Confusion Arbitrary File Read to RCE

Explore the n8n Content-Type Confusion Arbitrary File Read to RCE vulnerability and learn how to exploit it.

Learn more
CVE-2026-21858
RCESQL Injection
Created 2 days ago

Grafana SQL Expressions Remote Code Execution

Explore the Grafana SQL Expressions Remote Code Execution vulnerability and learn how to exploit it.

Learn more
CVE-2024-9264
RCELLM
Created a month ago

ComfyUI-Manager Remote Code Execution

Explore the ComfyUI-Manager Remote Code Execution vulnerability and learn how to exploit it.

Learn more
CVE-2025-67303
Auth BypassRCEEnvironment Injection
Created 2 months ago

GNU InetUtils telnetd Argument Injection Authentication Bypass

Explore the GNU InetUtils telnetd Argument Injection Authentication Bypass vulnerability and learn how to exploit it.

Learn more
CVE-2026-24061
RCECMS
Created 2 months ago

CraftCMS Yii Class Injection Remote Code Execution

Explore the CraftCMS Yii Class Injection Remote Code Execution vulnerability and learn how to exploit it.

Learn more
CVE-2025-32432
RCEFramework
Created 2 months ago

Livewire Component Property Hydration Remote Code Execution

Explore the Livewire Component Property Hydration Remote Code Execution vulnerability and learn how to exploit it.

Learn more
CVE-2025-54068

Ready to start your security research?

Explore our collection of vulnerable environments and enhance your security skills today.