Vulnerabilities with Nuclei Scanner Templates

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
4,077 results Clear all
CVE-2025-55749 7.5 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.01
XWiki <16.10.11, 17.4.4, 17.7.0 - Info Disclosure
XWiki is an open-source wiki software platform. From 16.7.0 to 16.10.11, 17.4.4, or 17.7.0, in an instance which is using the XWiki Jetty package (XJetty), a context is exposed to statically access any file located in the webapp/ folder. It allows accessing files which might contains credentials. Fixed in 16.10.11, 17.4.4, and 17.7.0.
CWE-284 Dec 01, 2025
CVE-2025-58360 8.2 HIGH KEV 8 PoCs Analysis NUCLEI EPSS 0.84
GeoServer WMS GetMap XXE Arbitrary File Read
GeoServer is an open source server that allows users to share and edit geospatial data. From version 2.26.0 to before 2.26.2 and before 2.25.6, an XML External Entity (XXE) vulnerability was identified. The application accepts XML input through a specific endpoint /geoserver/wms operation GetMap. However, this input is not sufficiently sanitized or restricted, allowing an attacker to define external entities within the XML request. This issue has been patched in GeoServer 2.25.6, GeoServer 2.26.3, and GeoServer 2.27.0.
CWE-611 Nov 25, 2025
CVE-2025-13138 7.5 HIGH NUCLEI EPSS 0.10
WP Directory Kit <1.4.3 - SQL Injection
The WP Directory Kit plugin for WordPress is vulnerable to SQL Injection via the 'columns_search' parameter of the select_2_ajax() function in all versions up to, and including, 1.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Nov 21, 2025
CVE-2025-11368 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.01
LearnPress - WordPress LMS Plugin <4.2.9.4 - Info Disclosure
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 4.2.9.4. This is due to missing capability checks in the REST endpoint /wp-json/lp/v1/load_content_via_ajax which allows arbitrary callback execution of admin-only template methods. This makes it possible for unauthenticated attackers to retrieve admin curriculum HTML, quiz questions with correct answers, course materials, and other sensitive educational content via the REST API endpoint granted they can supply valid numeric IDs.
CWE-200 Nov 21, 2025
CVE-2025-13315 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.84
Twonky Server Log Leak Authentication Bypass
Twonky Server 8.5.2 on Linux and Windows is vulnerable to an access control flaw. An unauthenticated attacker can bypass web service API authentication controls to leak a log file and read the administrator's username and encrypted password.
CWE-420 Nov 19, 2025
CVE-2025-64764 7.1 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.00
Astro < 5.15.8 - Basic XSS
Astro is a web framework. Prior to version 5.15.8, a reflected XSS vulnerability is present when the server islands feature is used in the targeted application, regardless of what was intended by the component template(s). This issue has been patched in version 5.15.8.
CWE-80 Nov 19, 2025
CVE-2025-64446 9.8 CRITICAL KEV RANSOMWARE 23 PoCs Analysis NUCLEI EPSS 0.93
Fortinet FortiWeb unauthenticated RCE
A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.
CWE-23 Nov 14, 2025
CVE-2025-64525 6.5 MEDIUM 1 Writeup NUCLEI EPSS 0.01
Astro < 5.15.5 - SSRF
Astro is a web framework. In Astro versions 2.16.0 up to but excluding 5.15.5 which utilizeon-demand rendering, request headers `x-forwarded-proto` and `x-forwarded-port` are insecurely used, without sanitization, to build the URL. This has several consequences, the most important of which are: middleware-based protected route bypass (only via `x-forwarded-proto`), DoS via cache poisoning (if a CDN is present), SSRF (only via `x-forwarded-proto`), URL pollution (potential SXSS, if a CDN is present), and WAF bypass. Version 5.15.5 contains a patch.
CWE-918 Nov 13, 2025
CVE-2025-9316 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.81
N-central <2025.4 - Info Disclosure
N-central < 2025.4 can generate sessionIDs for unauthenticated users This issue affects N-central: before 2025.4.
CWE-1284 Nov 12, 2025
CVE-2025-11700 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.47
N-able N-Central Authentication Bypass and XXE Scanner
N-central versions < 2025.4 are vulnerable to multiple XML External Entities injection leading to information disclosure
CWE-611 Nov 12, 2025
CVE-2025-12101 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.02
NetScaler ADC/NetScaler Gateway - XSS
Cross-Site Scripting (XSS) in NetScaler ADC and NetScaler Gateway when the appliance is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
CWE-79 Nov 11, 2025
CVE-2025-11307 8.8 HIGH NUCLEI EPSS 0.02
WP Go Maps <9.0.48 - XSS
The WP Go Maps (formerly WP Google Maps) WordPress plugin before 9.0.48 does not sanitize user input provided via an AJAX action, allowing unauthenticated users to store XSS payloads which are later retrieved from another AJAX call and output unescaped.
Nov 11, 2025
CVE-2025-12480 9.1 CRITICAL KEV 1 Writeup NUCLEI EPSS 0.78
Gladinet Triofox < 16.7.10368.56560 - Improper Access Control
Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
CWE-284 Nov 10, 2025
CVE-2025-34299 9.8 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.69
Monstaftp Monsta FTP < 2.11 - Unrestricted File Upload
Monsta FTP versions 2.11 and earlier contain a vulnerability that allows unauthenticated arbitrary file uploads. This flaw enables attackers to execute arbitrary code by uploading a specially crafted file from a malicious (S)FTP server.
CWE-434 Nov 07, 2025
CVE-2025-60188 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.02
Atarim - Info Disclosure
Insertion of Sensitive Information Into Sent Data vulnerability in Vito Peleg Atarim atarim-visual-collaboration allows Retrieve Embedded Sensitive Data.This issue affects Atarim: from n/a through <= 4.2.1.
CWE-201 Nov 06, 2025
CVE-2025-12139 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.16
Google Drive WordPress Plugin <1.5.3 - Info Disclosure
The File Manager for Google Drive – Integrate Google Drive with WordPress plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.5.3 via the "get_localize_data" function. This makes it possible for unauthenticated attackers to extract sensitive data including Google OAuth credentials (client_id and client_secret) and Google account email addresses.
CWE-200 Nov 05, 2025
CVE-2025-11749 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.84
WordPress AI Engine Plugin MCP Unauthenticated Admin Creation to RCE
The AI Engine plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.3 via the /mcp/v1/ REST API endpoint that exposes the 'Bearer Token' value when 'No-Auth URL' is enabled. This makes it possible for unauthenticated attackers to extract the bearer token, which can be used to gain access to a valid session and perform many actions like creating a new administrator account, leading to privilege escalation.
CWE-200 Nov 05, 2025
CVE-2025-11833 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.16
Post SMTP <3.6.0 - Info Disclosure
The Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the __construct function in all versions up to, and including, 3.6.0. This makes it possible for unauthenticated attackers to read arbitrary logged emails sent through the Post SMTP plugin, including password reset emails containing password reset links, which can lead to account takeover.
CWE-862 Nov 01, 2025
CVE-2025-52665 10.0 CRITICAL EXPLOITED NUCLEI EPSS 0.12
UI Unifi Access < 4.0.21 - Missing Authentication
A malicious actor with access to the management network could exploit a misconfiguration in UniFi’s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version 4.0.21 and later.  Affected Products: UniFi Access Application (Version 3.3.22 through 3.4.31). 
 Mitigation: Update your UniFi Access Application to Version 4.0.21 or later.
CWE-306 Oct 31, 2025
CVE-2025-64095 10.0 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.13
Dnnsoftware Dotnetnuke < 10.1.1 - Unrestricted File Upload
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 10.1.1, the default HTML editor provider allows unauthenticated file uploads and images can overwrite existing files. An unauthenticated user can upload and replace existing files allowing defacing a website and combined with other issue, injection XSS payloads. This vulnerability is fixed in 10.1.1.
CWE-434 Oct 28, 2025