Vulnerabilities with Nuclei Scanner Templates
Updated 6h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2021-24351
6.1
MEDIUM
NUCLEI
EPSS 0.15
Posimyth The Plus Addons For Elementor < 4.1.12 - XSS
The theplus_more_post AJAX action of The Plus Addons for Elementor Page Builder WordPress plugin before 4.1.12 did not properly sanitise some of its fields, leading to a reflected Cross-Site Scripting (exploitable on both unauthenticated and authenticated users)
CWE-79
Jun 14, 2021
CVE-2021-24347
8.8
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.81
SP Project & Document Manager <4.22 - Path Traversal
The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from "php" to "pHP".
CWE-178
Jun 14, 2021
CVE-2021-23394
8.1
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.77
Std42 Elfinder < 2.1.58 - Unrestricted File Upload
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CWE-434
Jun 13, 2021
CVE-2021-22175
6.8
MEDIUM
KEV
NUCLEI
EPSS 0.75
Gitlab < 13.6.7 - SSRF
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled
CWE-918
Jun 11, 2021
CVE-2021-22214
6.8
MEDIUM
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.93
Gitlab < 13.10.5 - SSRF
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited
CWE-918
Jun 08, 2021
CVE-2021-24342
6.1
MEDIUM
NUCLEI
EPSS 0.02
Jnews < 8.0.6 - XSS
The JNews WordPress theme before 8.0.6 did not sanitise the cat_id parameter in the POST request /?ajax-request=jnews (with action=jnews_build_mega_category_*), leading to a Reflected Cross-Site Scripting (XSS) issue.
CWE-79
Jun 07, 2021
CVE-2021-24340
7.5
HIGH
NUCLEI
EPSS 0.83
Veronalabs WP Statistics < 13.0.8 - SQL Injection
The WP Statistics WordPress plugin before 13.0.8 relied on using the WordPress esc_sql() function on a field not delimited by quotes and did not first prepare the query. Additionally, the page, which should have been accessible to administrator only, was also available to any visitor, including unauthenticated ones.
CWE-89
Jun 07, 2021
CVE-2021-24335
6.1
MEDIUM
NUCLEI
EPSS 0.45
Smartdatasoft Car Repair Services & Auto Mechanic < 4.0 - XSS
The Car Repair Services & Auto Mechanic WordPress theme before 4.0 did not properly sanitise its serviceestimatekey search parameter before outputting it back in the page, leading to a reflected Cross-Site Scripting issue
CWE-79
Jun 01, 2021
CVE-2021-24320
6.1
MEDIUM
NUCLEI
EPSS 0.50
Bold-themes Bello < 1.6.0 - XSS
The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise and escape its listing_list_view, bt_bb_listing_field_my_lat, bt_bb_listing_field_my_lng, bt_bb_listing_field_distance_value, bt_bb_listing_field_my_lat_default, bt_bb_listing_field_keyword, bt_bb_listing_field_location_autocomplete, bt_bb_listing_field_price_range_from and bt_bb_listing_field_price_range_to parameter in ints listing page, leading to reflected Cross-Site Scripting issues.
CWE-79
Jun 01, 2021
CVE-2021-24316
6.1
MEDIUM
NUCLEI
EPSS 0.57
Wowthemes Mediumish < 1.0.47 - XSS
The search feature of the Mediumish WordPress theme through 1.0.47 does not properly sanitise it's 's' GET parameter before output it back the page, leading to the Cross-SIte Scripting issue.
CWE-79
Jun 01, 2021
CVE-2021-22911
9.8
CRITICAL
EXPLOITED
16 PoCs
Analysis
NUCLEI
EPSS 0.92
Rocket.Chat <3.14 - SQL Injection
A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.
CWE-75
May 27, 2021
CVE-2021-21985
9.8
CRITICAL
KEV
RANSOMWARE
14 PoCs
Analysis
NUCLEI
EPSS 0.94
Vmware Vcenter Server < 3.10.2.1 - SSRF
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
CWE-470
May 26, 2021
CVE-2021-24300
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.03
Pickplugins Product Slider For Woocommerce < 1.13.22 - XSS
The slider import search feature of the PickPlugins Product Slider for WooCommerce WordPress plugin before 1.13.22 did not properly sanitised the keyword GET parameter, leading to reflected Cross-Site Scripting issue
CWE-79
May 24, 2021
CVE-2021-24298
6.1
MEDIUM
NUCLEI
EPSS 0.14
Ibenic Simple Giveaways < 2.36.2 - XSS
The method and share GET parameters of the Giveaway pages were not sanitised, validated or escaped before being output back in the pages, thus leading to reflected XSS
CWE-79
May 24, 2021
CVE-2021-24295
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.41
Cleantalk Spam Protection, Antispam, Firewall - SQL Injection
It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset.
CWE-89
May 17, 2021
CVE-2021-24288
6.1
MEDIUM
NUCLEI
EPSS 0.04
Acymailing < 7.5.0 - Open Redirect
When subscribing using AcyMailing, the 'redirect' parameter isn't properly sanitized. Turning the request from POST to GET, an attacker can craft a link containing a potentially malicious landing page and send it to the victim.
CWE-601
May 17, 2021
CVE-2021-24291
6.1
MEDIUM
NUCLEI
EPSS 0.15
10web Photo Gallery < 1.5.69 - XSS
The Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin before 1.5.69 was vulnerable to Reflected Cross-Site Scripting (XSS) issues via the gallery_id, tag, album_id and _id GET parameters passed to the bwg_frontend_data AJAX action (available to both unauthenticated and authenticated users)
CWE-79
May 14, 2021
CVE-2021-24287
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.22
Mooveagency Select All Categories And... - XSS
The settings page of the Select All Categories and Taxonomies, Change Checkbox to Radio Buttons WordPress plugin before 1.3.2 did not properly sanitise the tab parameter before outputting it back, leading to a reflected Cross-Site Scripting issue
CWE-79
May 14, 2021
CVE-2021-24286
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.52
Mooveagency Redirect 404 TO Parent < 1.3.1 - XSS
The settings page of the Redirect 404 to parent WordPress plugin before 1.3.1 did not properly sanitise the tab parameter before outputting it back, leading to a reflected Cross-Site Scripting issue
CWE-79
May 14, 2021
CVE-2021-24285
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.89
Cars-seller-auto-classifieds-script < 2.1.0 - SQL Injection
The request_list_request AJAX call of the Car Seller - Auto Classifieds Script WordPress plugin through 2.1.0, available to both authenticated and unauthenticated users, does not sanitise, validate or escape the order_id POST parameter before using it in a SQL statement, leading to a SQL Injection issue.
CWE-89
May 14, 2021