Vulnerabilities with Nuclei Scanner Templates
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2022-1388
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
76 PoCs
Analysis
NUCLEI
EPSS 0.94
F5 BIG-IP iControl RCE via REST Authentication Bypass
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CWE-306
May 05, 2022
CVE-2022-0952
8.8
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.88
Sitemap < 1.0.36 - Missing Authorization
The Sitemap by click5 WordPress plugin before 1.0.36 does not have authorisation and CSRF checks when updating options via a REST endpoint, and does not ensure that the option to be updated belongs to the plugin. As a result, unauthenticated attackers could change arbitrary blog options, such as the users_can_register and default_role, allowing them to create a new admin account and take over the blog.
CWE-862
May 02, 2022
CVE-2022-0783
9.8
CRITICAL
NUCLEI
EPSS 0.55
WooCommerce <2.0 - SQL Injection
The Multiple Shipping Address Woocommerce WordPress plugin before 2.0 does not properly sanitise and escape numerous parameters before using them in SQL statements via some AJAX actions available to unauthenticated users, leading to unauthenticated SQL injections
CWE-89
May 02, 2022
CVE-2022-0773
9.8
CRITICAL
NUCLEI
EPSS 0.71
Documentor WP <1.5.3 - SQL Injection
The Documentor WordPress plugin through 1.5.3 fails to sanitize and escape user input before it is being interpolated in an SQL statement and then executed, leading to an SQL Injection exploitable by unauthenticated users.
CWE-89
May 02, 2022
CVE-2022-1392
7.5
HIGH
NUCLEI
EPSS 0.51
Commoninja Videos Sync Pdf < 1.7.4 - Path Traversal
The Videos sync PDF WordPress plugin through 1.7.4 does not validate the p parameter before using it in an include statement, which could lead to Local File Inclusion issues
CWE-22
Apr 25, 2022
CVE-2022-1391
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.67
Kanev Cab Fare Calculator < 1.0.4 - Path Traversal
The Cab fare calculator WordPress plugin before 1.0.4 does not validate the controller parameter before using it in require statements, which could lead to Local File Inclusion issues.
CWE-22
Apr 25, 2022
CVE-2022-1390
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.91
Admin Word Count Column < 2.2 - Path Traversal
The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique
CWE-22
Apr 25, 2022
CVE-2022-0769
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.87
Users Ultra WP <3.1.0 - SQL Injection
The Users Ultra WordPress plugin through 3.1.0 fails to properly sanitize and escape the data_target parameter before it is being interpolated in an SQL statement and then executed via the rating_vote AJAX action (available to both unauthenticated and authenticated users), leading to an SQL Injection.
CWE-89
Apr 25, 2022
CVE-2022-0693
9.8
CRITICAL
NUCLEI
EPSS 0.68
Master Elements WP <8.0 - SQL Injection
The Master Elements WordPress plugin through 8.0 does not validate and escape the meta_ids parameter of its remove_post_meta_condition AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an unauthenticated SQL Injection
CWE-89
Apr 25, 2022
CVE-2022-0656
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.68
The Web To Print Shop : uDraw WordPress plugin <3.3.3 - Info Disclo...
The Web To Print Shop : uDraw WordPress plugin before 3.3.3 does not validate the url parameter in its udraw_convert_url_to_base64 AJAX action (available to both unauthenticated and authenticated users) before using it in the file_get_contents function and returning its content base64 encoded in the response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc)
CWE-552
Apr 25, 2022
CVE-2022-1439
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.46
Microweber < 1.2.15 - XSS
Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press "tab" but there is probably a paylaod that runs without user interaction.
CWE-79
Apr 22, 2022
CVE-2022-0540
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Atlassian Jira <8.13.18, <8.14.0-8.20.5, <8.21.0-8.22.0 - Auth Bypass
A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.
CWE-287
Apr 20, 2022
CVE-2022-1329
8.8
HIGH
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.93
Elementor Website Builder < 3.6.2 - Missing Authorization
The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.
CWE-862
Apr 19, 2022
CVE-2022-1119
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.82
Simplefilelist Simple-file-list < 3.2.8 - Path Traversal
The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7.
CWE-22
Apr 19, 2022
CVE-2022-1054
5.3
MEDIUM
NUCLEI
EPSS 0.12
Wpchill Rsvp And Event Management < 2.7.8 - Missing Authorization
The RSVP and Event Management Plugin WordPress plugin before 2.7.8 does not have any authorisation checks when exporting its entries, and has the export function hooked to the init action. As a result, unauthenticated attackers could call it and retrieve PII such as first name, last name and email address of user registered for events
CWE-862
Apr 18, 2022
CVE-2022-1020
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.90
Codeastrology Woo Product Table < 3.1.2 - Missing Authorization
The Product Table for WooCommerce (wooproducttable) WordPress plugin before 3.1.2 does not have authorisation and CSRF checks in the wpt_admin_update_notice_option AJAX action (available to both unauthenticated and authenticated users), as well as does not validate the callback parameter, allowing unauthenticated attackers to call arbitrary functions with either none or one user controlled argument
CWE-862
Apr 18, 2022
CVE-2022-0879
6.1
MEDIUM
NUCLEI
EPSS 0.01
Calderaforms Caldera Forms < 1.9.7 - XSS
The Caldera Forms WordPress plugin before 1.9.7 does not validate and escape the cf-api parameter before outputting it back in the response, leading to a Reflected Cross-Site Scripting
CWE-79
Apr 18, 2022
CVE-2022-0785
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.70
Daily Prayer Time WP <2022.03.01 - SQL Injection
The Daily Prayer Time WordPress plugin before 2022.03.01 does not sanitise and escape the month parameter before using it in a SQL statement via the get_monthly_timetable AJAX action (available to unauthenticated users), leading to an unauthenticated SQL injection
CWE-89
Apr 18, 2022
CVE-2022-0765
5.4
MEDIUM
NUCLEI
EPSS 0.07
Loco Translate <2.6.1 - XSS
The Loco Translate WordPress plugin before 2.6.1 does not properly remove inline events from elements in the source translation strings before outputting them in the editor in the plugin admin panel, allowing any user with access to the plugin (Translator and Administrator by default) to add arbitrary javascript payloads to the source strings leading to a stored cross-site scripting (XSS) vulnerability.
CWE-79
Apr 18, 2022
CVE-2022-22956
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.84
Vmware Identity Manager < 9.0 - Authentication Bypass
VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.
CWE-287
Apr 13, 2022