Vulnerabilities with Nuclei Scanner Templates
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2025-54249
6.5
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.06
Adobe Experience Manager < 6.5.23.0 - SSRF
Adobe Experience Manager versions 6.5.23.0 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to manipulate server-side requests and bypass security controls allowing unauthorized read access.
CWE-918
Sep 09, 2025
CVE-2025-54236
9.1
CRITICAL
KEV
6 PoCs
Analysis
NUCLEI
EPSS 0.60
Magento SessionReaper
Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15 and earlier are affected by an Improper Input Validation vulnerability. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue does not require user interaction.
CWE-20
Sep 09, 2025
CVE-2025-58751
5.3
MEDIUM
2 Writeups
NUCLEI
EPSS 0.01
Vite <7.1.5, <7.0.7, <6.3.6, <5.4.20 - Auth Bypass
Vite is a frontend tooling framework for JavaScript. Prior to versions 7.1.5, 7.0.7, 6.3.6, and 5.4.20, files starting with the same name with the public directory were served bypassing the `server.fs` settings. Only apps that explicitly expose the Vite dev server to the network (using --host or `server.host` config option), use the public directory feature (enabled by default), and have a symlink in the public directory are affected. Versions 7.1.5, 7.0.7, 6.3.6, and 5.4.20 fix the issue.
CWE-22
Sep 08, 2025
CVE-2025-56266
9.8
CRITICAL
1 Writeup
NUCLEI
EPSS 0.07
Avigilon Access Control Manager - HTTP Request Smuggling
A Host Header Injection vulnerability in Avigilon ACM v7.10.0.20 allows attackers to execute arbitrary code via supplying a crafted URL.
CWE-74
Sep 08, 2025
CVE-2025-51586
3.7
LOW
1 PoC
Analysis
NUCLEI
EPSS 0.01
PrestaShop <8.2.1 - Info Disclosure
An issue was discoverd in file controllers/admin/AdminLoginController.php in PrestaShop before 8.2.1 allowing attackers to gain sensitive information via the reset password feature.
CWE-359
Sep 08, 2025
CVE-2025-10090
7.3
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.01
Jinher OA < 1.2 - Injection
A flaw has been found in Jinher OA up to 1.2. The impacted element is an unknown function of the file /C6/Jhsoft.Web.departments/GetTreeDate.aspx. Executing manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used.
CWE-74
Sep 08, 2025
CVE-2025-8085
8.6
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.11
Metaphorcreations Ditty < 3.1.58 - SSRF
The Ditty WordPress plugin before 3.1.58 lacks authorization and authentication for requests to its displayItems endpoint, allowing unauthenticated visitors to make requests to arbitrary URLs.
CWE-918
Sep 08, 2025
CVE-2025-58443
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.12
FOG <1.5.10.1673 - Auth Bypass
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.
CWE-287
Sep 06, 2025
CVE-2025-58179
7.2
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.00
@astrojs/cloudflare < 12.6.6 - SSRF
Astro is a web framework for content-driven websites. Versions 11.0.3 through 12.6.5 are vulnerable to SSRF when using Astro's Cloudflare adapter. When configured with output: 'server' while using the default imageService: 'compile', the generated image optimization endpoint doesn't check the URLs it receives, allowing content from unauthorized third-party domains to be served. a A bug in impacted versions of the @astrojs/cloudflare adapter for deployment on Cloudflare’s infrastructure, allows an attacker to bypass the third-party domain restrictions and serve any content from the vulnerable origin. This issue is fixed in version 12.6.6.
CWE-918
Sep 05, 2025
CVE-2025-55190
9.9
CRITICAL
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.05
Argo CD <3.1.1 - Info Disclosure
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. In versions 2.13.0 through 2.13.8, 2.14.0 through 2.14.15, 3.0.0 through 3.0.12 and 3.1.0-rc1 through 3.1.1, API tokens with project-level permissions are able to retrieve sensitive repository credentials (usernames, passwords) through the project details API endpoint, even when the token only has standard application management permissions and no explicit access to secrets. This vulnerability does not only affect project-level permissions. Any token with project get permissions is also vulnerable, including global permissions such as: `p, role/user, projects, get, *, allow`. This issue is fixed in versions 2.13.9, 2.14.16, 3.0.14 and 3.1.2.
CWE-200
Sep 04, 2025
CVE-2025-55748
7.5
HIGH
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.00
XWiki Platform <16.10.6 - Info Disclosure
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 4.2-milestone-2 through 16.10.6, configuration files are accessible through jsx and sx endpoints. It's possible to access and read configuration files by using URLs such as `http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false`. This is fixed in version 16.10.7.
CWE-23
Sep 03, 2025
CVE-2025-55747
9.1
CRITICAL
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.01
XWiki Platform <16.10.6 - Info Disclosure
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 6.1-milestone-2 through 16.10.6, configuration files are accessible through the webjars API. This is fixed in version 16.10.7.
CWE-23
Sep 03, 2025
CVE-2025-57808
8.1
HIGH
1 Writeup
NUCLEI
EPSS 0.05
ESPHome <2025.8.0 - Auth Bypass
ESPHome is a system to control microcontrollers remotely through Home Automation systems. In version 2025.8.0 in the ESP-IDF platform, ESPHome's web_server authentication check can pass incorrectly when the client-supplied base64-encoded Authorization value is empty or is a substring of the correct value. This allows access to web_server functionality (including OTA, if enabled) without knowing any information about the correct username or password. This issue has been patched in version 2025.8.1.
CWE-303
Sep 02, 2025
CVE-2025-9744
7.3
HIGH
NUCLEI
EPSS 0.02
Campcodes Online Loan Management System 1.0 - SQL Injection
A weakness has been identified in Campcodes Online Loan Management System 1.0. The affected element is an unknown function of the file /ajax.php?action=login. Executing manipulation of the argument Username can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.
CWE-74
Aug 31, 2025
CVE-2025-57822
6.5
MEDIUM
1 Writeup
NUCLEI
EPSS 0.06
Vercel Next.js < 14.2.32 - SSRF
Next.js is a React framework for building full-stack web applications. Prior to versions 14.2.32 and 15.4.7, when next() was used without explicitly passing the request object, it could lead to SSRF in self-hosted applications that incorrectly forwarded user-supplied headers. This vulnerability has been fixed in Next.js versions 14.2.32 and 15.4.7. All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the next() function.
CWE-918
Aug 29, 2025
CVE-2025-57819
9.8
CRITICAL
KEV
13 PoCs
Analysis
NUCLEI
EPSS 0.77
Sangoma Freepbx < 15.0.66 - SQL Injection
FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3.
CWE-288
Aug 28, 2025
CVE-2025-53118
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.35
Unified PAM - Auth Bypass
An authentication bypass vulnerability exists which allows an unauthenticated attacker to control administrator backup functions, leading to compromise of passwords, secrets, and application session tokens stored by the Unified PAM.
CWE-306
Aug 25, 2025
CVE-2025-55523
3.5
LOW
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.00
Agent-Zero <0.8.* - Path Traversal
An issue in the component /api/download_work_dir_file.py of Agent-Zero v0.8.* allows attackers to execute a directory traversal.
CWE-22
Aug 21, 2025
CVE-2025-51991
8.8
HIGH
1 Writeup
NUCLEI
EPSS 0.04
Xwiki < 17.3.0 - Code Injection
XWiki through version 17.3.0 is vulnerable to Server-Side Template Injection (SSTI) in the Administration interface, specifically within the HTTP Meta Info field of the Global Preferences Presentation section. An authenticated administrator can inject crafted Apache Velocity template code, which is rendered on the server side without proper validation or sandboxing. This enables the execution of arbitrary template logic, which may expose internal server information or, in specific configurations, lead to further exploitation such as remote code execution or sensitive data leakage. The vulnerability resides in improper handling of dynamic template rendering within user-supplied configuration fields.
CWE-94
Aug 20, 2025
CVE-2025-51990
4.8
MEDIUM
1 Writeup
NUCLEI
EPSS 0.00
Xwiki < 17.3.0 - XSS
XWiki through version 17.3.0 is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities in the Administration interface, specifically under the Presentation section of the Global Preferences panel. An authenticated administrator can inject arbitrary JavaScript payloads into the HTTP Meta Info, Footer Copyright, and Footer Version fields. These inputs are stored and subsequently rendered without proper output encoding or sanitization on public-facing pages. As a result, the injected scripts are persistently executed in the browser context of any visitor to the affected instances including both authenticated and unauthenticated users. No user interaction is required beyond visiting a page that includes the malicious content. Successful exploitation can lead to session hijacking, credential theft, unauthorized actions via session riding, or further compromise of the application through client-side attacks. The vulnerability introduces significant risk in any deployment, especially in shared or internet-facing environments where administrator credentials may be compromised.
CWE-79
Aug 20, 2025