Vulhub

Vulhub is an open-source collection of pre-built vulnerable docker environments for security researchers and educators.

- Stars- Forks0 Environments
# Clone the repository
git clone --depth 1 https://github.com/vulhub/vulhub.git

# Enter the directory
cd vulhub/spring/CVE-2022-22947

# Start the environment
docker compose up -d

Why Use Vulhub?

Docker Based

All environments are built with Docker and Docker Compose, making them easy to deploy and isolate.

Real Vulnerabilities

Practice with real-world vulnerabilities in a safe, controlled environment for learning and research.

Well Documented

Each vulnerability comes with detailed documentation explaining the vulnerability and exploitation steps.

Latest Environments

View all environments
RCE
Created a day ago

pgAdmin4 <= 9.10 Database Restore Tool Command Injection

Explore the pgAdmin4 <= 9.10 Database Restore Tool Command Injection vulnerability and learn how to exploit it.

Learn more
CVE-2025-13780
RCEDeserializationFramework
Created 11 days ago

React Server Components Flight Protocol Deserialization RCE

Explore the React Server Components Flight Protocol Deserialization RCE vulnerability and learn how to exploit it.

Learn more
CVE-2025-55182
RCE
Created 3 months ago

pgAdmin4 <= 9.1 Authenticated Remote Code Execution

Explore the pgAdmin4 <= 9.1 Authenticated Remote Code Execution vulnerability and learn how to exploit it.

Learn more
CVE-2025-2945
SQL Injection
Created 3 months ago

1Panel Control Panel PostAuth SQL Injection

Explore the 1Panel Control Panel PostAuth SQL Injection vulnerability and learn how to exploit it.

Learn more
CVE-2024-39907
Path Traversal
Created 5 months ago

aiohttp Directory Traversal Vulnerability

Explore the aiohttp Directory Traversal Vulnerability vulnerability and learn how to exploit it.

Learn more
CVE-2024-23334
SSRF
Created 6 months ago

Apache CXF Aegis DataBinding Server-Side Request Forgery

Explore the Apache CXF Aegis DataBinding Server-Side Request Forgery vulnerability and learn how to exploit it.

Learn more
CVE-2024-28752

Ready to start your security research?

Explore our collection of vulnerable environments and enhance your security skills today.