Vulnerabilities with Nuclei Scanner Templates

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,682 CVEs tracked 53,700 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,389 vendors 43,933 researchers
4,077 results Clear all
CVE-2022-1388 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 76 PoCs Analysis NUCLEI EPSS 0.94
F5 BIG-IP iControl RCE via REST Authentication Bypass
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CWE-306 May 05, 2022
CVE-2022-0952 8.8 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.88
Sitemap < 1.0.36 - Missing Authorization
The Sitemap by click5 WordPress plugin before 1.0.36 does not have authorisation and CSRF checks when updating options via a REST endpoint, and does not ensure that the option to be updated belongs to the plugin. As a result, unauthenticated attackers could change arbitrary blog options, such as the users_can_register and default_role, allowing them to create a new admin account and take over the blog.
CWE-862 May 02, 2022
CVE-2022-0783 9.8 CRITICAL NUCLEI EPSS 0.55
WooCommerce <2.0 - SQL Injection
The Multiple Shipping Address Woocommerce WordPress plugin before 2.0 does not properly sanitise and escape numerous parameters before using them in SQL statements via some AJAX actions available to unauthenticated users, leading to unauthenticated SQL injections
CWE-89 May 02, 2022
CVE-2022-0773 9.8 CRITICAL NUCLEI EPSS 0.71
Documentor WP <1.5.3 - SQL Injection
The Documentor WordPress plugin through 1.5.3 fails to sanitize and escape user input before it is being interpolated in an SQL statement and then executed, leading to an SQL Injection exploitable by unauthenticated users.
CWE-89 May 02, 2022
CVE-2022-1392 7.5 HIGH NUCLEI EPSS 0.51
Commoninja Videos Sync Pdf < 1.7.4 - Path Traversal
The Videos sync PDF WordPress plugin through 1.7.4 does not validate the p parameter before using it in an include statement, which could lead to Local File Inclusion issues
CWE-22 Apr 25, 2022
CVE-2022-1391 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.67
Kanev Cab Fare Calculator < 1.0.4 - Path Traversal
The Cab fare calculator WordPress plugin before 1.0.4 does not validate the controller parameter before using it in require statements, which could lead to Local File Inclusion issues.
CWE-22 Apr 25, 2022
CVE-2022-1390 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.91
Admin Word Count Column < 2.2 - Path Traversal
The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique
CWE-22 Apr 25, 2022
CVE-2022-0769 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.87
Users Ultra WP <3.1.0 - SQL Injection
The Users Ultra WordPress plugin through 3.1.0 fails to properly sanitize and escape the data_target parameter before it is being interpolated in an SQL statement and then executed via the rating_vote AJAX action (available to both unauthenticated and authenticated users), leading to an SQL Injection.
CWE-89 Apr 25, 2022
CVE-2022-0693 9.8 CRITICAL NUCLEI EPSS 0.68
Master Elements WP <8.0 - SQL Injection
The Master Elements WordPress plugin through 8.0 does not validate and escape the meta_ids parameter of its remove_post_meta_condition AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an unauthenticated SQL Injection
CWE-89 Apr 25, 2022
CVE-2022-0656 7.5 HIGH EXPLOITED NUCLEI EPSS 0.68
The Web To Print Shop : uDraw WordPress plugin <3.3.3 - Info Disclo...
The Web To Print Shop : uDraw WordPress plugin before 3.3.3 does not validate the url parameter in its udraw_convert_url_to_base64 AJAX action (available to both unauthenticated and authenticated users) before using it in the file_get_contents function and returning its content base64 encoded in the response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc)
CWE-552 Apr 25, 2022
CVE-2022-1439 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.46
Microweber < 1.2.15 - XSS
Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press "tab" but there is probably a paylaod that runs without user interaction.
CWE-79 Apr 22, 2022
CVE-2022-0540 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Atlassian Jira <8.13.18, <8.14.0-8.20.5, <8.21.0-8.22.0 - Auth Bypass
A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.
CWE-287 Apr 20, 2022
CVE-2022-1329 8.8 HIGH EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.93
Elementor Website Builder < 3.6.2 - Missing Authorization
The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.
CWE-862 Apr 19, 2022
CVE-2022-1119 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.82
Simplefilelist Simple-file-list < 3.2.8 - Path Traversal
The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7.
CWE-22 Apr 19, 2022
CVE-2022-1054 5.3 MEDIUM NUCLEI EPSS 0.12
Wpchill Rsvp And Event Management < 2.7.8 - Missing Authorization
The RSVP and Event Management Plugin WordPress plugin before 2.7.8 does not have any authorisation checks when exporting its entries, and has the export function hooked to the init action. As a result, unauthenticated attackers could call it and retrieve PII such as first name, last name and email address of user registered for events
CWE-862 Apr 18, 2022
CVE-2022-1020 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.90
Codeastrology Woo Product Table < 3.1.2 - Missing Authorization
The Product Table for WooCommerce (wooproducttable) WordPress plugin before 3.1.2 does not have authorisation and CSRF checks in the wpt_admin_update_notice_option AJAX action (available to both unauthenticated and authenticated users), as well as does not validate the callback parameter, allowing unauthenticated attackers to call arbitrary functions with either none or one user controlled argument
CWE-862 Apr 18, 2022
CVE-2022-0879 6.1 MEDIUM NUCLEI EPSS 0.01
Calderaforms Caldera Forms < 1.9.7 - XSS
The Caldera Forms WordPress plugin before 1.9.7 does not validate and escape the cf-api parameter before outputting it back in the response, leading to a Reflected Cross-Site Scripting
CWE-79 Apr 18, 2022
CVE-2022-0785 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.70
Daily Prayer Time WP <2022.03.01 - SQL Injection
The Daily Prayer Time WordPress plugin before 2022.03.01 does not sanitise and escape the month parameter before using it in a SQL statement via the get_monthly_timetable AJAX action (available to unauthenticated users), leading to an unauthenticated SQL injection
CWE-89 Apr 18, 2022
CVE-2022-0765 5.4 MEDIUM NUCLEI EPSS 0.07
Loco Translate <2.6.1 - XSS
The Loco Translate WordPress plugin before 2.6.1 does not properly remove inline events from elements in the source translation strings before outputting them in the editor in the plugin admin panel, allowing any user with access to the plugin (Translator and Administrator by default) to add arbitrary javascript payloads to the source strings leading to a stored cross-site scripting (XSS) vulnerability.
CWE-79 Apr 18, 2022
CVE-2022-22956 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.84
Vmware Identity Manager < 9.0 - Authentication Bypass
VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.
CWE-287 Apr 13, 2022