Vulnerabilities with Nuclei Scanner Templates

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,482 CVEs tracked 53,635 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,335 vendors 43,883 researchers
4,077 results Clear all
CVE-2021-24351 6.1 MEDIUM NUCLEI EPSS 0.15
Posimyth The Plus Addons For Elementor < 4.1.12 - XSS
The theplus_more_post AJAX action of The Plus Addons for Elementor Page Builder WordPress plugin before 4.1.12 did not properly sanitise some of its fields, leading to a reflected Cross-Site Scripting (exploitable on both unauthenticated and authenticated users)
CWE-79 Jun 14, 2021
CVE-2021-24347 8.8 HIGH 1 PoC Analysis NUCLEI EPSS 0.81
SP Project & Document Manager <4.22 - Path Traversal
The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from "php" to "pHP".
CWE-178 Jun 14, 2021
CVE-2021-23394 8.1 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.77
Std42 Elfinder < 2.1.58 - Unrestricted File Upload
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CWE-434 Jun 13, 2021
CVE-2021-22175 6.8 MEDIUM KEV NUCLEI EPSS 0.75
Gitlab < 13.6.7 - SSRF
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled
CWE-918 Jun 11, 2021
CVE-2021-22214 6.8 MEDIUM EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.93
Gitlab < 13.10.5 - SSRF
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited
CWE-918 Jun 08, 2021
CVE-2021-24342 6.1 MEDIUM NUCLEI EPSS 0.02
Jnews < 8.0.6 - XSS
The JNews WordPress theme before 8.0.6 did not sanitise the cat_id parameter in the POST request /?ajax-request=jnews (with action=jnews_build_mega_category_*), leading to a Reflected Cross-Site Scripting (XSS) issue.
CWE-79 Jun 07, 2021
CVE-2021-24340 7.5 HIGH NUCLEI EPSS 0.83
Veronalabs WP Statistics < 13.0.8 - SQL Injection
The WP Statistics WordPress plugin before 13.0.8 relied on using the WordPress esc_sql() function on a field not delimited by quotes and did not first prepare the query. Additionally, the page, which should have been accessible to administrator only, was also available to any visitor, including unauthenticated ones.
CWE-89 Jun 07, 2021
CVE-2021-24335 6.1 MEDIUM NUCLEI EPSS 0.45
Smartdatasoft Car Repair Services & Auto Mechanic < 4.0 - XSS
The Car Repair Services & Auto Mechanic WordPress theme before 4.0 did not properly sanitise its serviceestimatekey search parameter before outputting it back in the page, leading to a reflected Cross-Site Scripting issue
CWE-79 Jun 01, 2021
CVE-2021-24320 6.1 MEDIUM NUCLEI EPSS 0.50
Bold-themes Bello < 1.6.0 - XSS
The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise and escape its listing_list_view, bt_bb_listing_field_my_lat, bt_bb_listing_field_my_lng, bt_bb_listing_field_distance_value, bt_bb_listing_field_my_lat_default, bt_bb_listing_field_keyword, bt_bb_listing_field_location_autocomplete, bt_bb_listing_field_price_range_from and bt_bb_listing_field_price_range_to parameter in ints listing page, leading to reflected Cross-Site Scripting issues.
CWE-79 Jun 01, 2021
CVE-2021-24316 6.1 MEDIUM NUCLEI EPSS 0.57
Wowthemes Mediumish < 1.0.47 - XSS
The search feature of the Mediumish WordPress theme through 1.0.47 does not properly sanitise it's 's' GET parameter before output it back the page, leading to the Cross-SIte Scripting issue.
CWE-79 Jun 01, 2021
CVE-2021-22911 9.8 CRITICAL EXPLOITED 16 PoCs Analysis NUCLEI EPSS 0.92
Rocket.Chat <3.14 - SQL Injection
A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.
CWE-75 May 27, 2021
CVE-2021-21985 9.8 CRITICAL KEV RANSOMWARE 14 PoCs Analysis NUCLEI EPSS 0.94
Vmware Vcenter Server < 3.10.2.1 - SSRF
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
CWE-470 May 26, 2021
CVE-2021-24300 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.03
Pickplugins Product Slider For Woocommerce < 1.13.22 - XSS
The slider import search feature of the PickPlugins Product Slider for WooCommerce WordPress plugin before 1.13.22 did not properly sanitised the keyword GET parameter, leading to reflected Cross-Site Scripting issue
CWE-79 May 24, 2021
CVE-2021-24298 6.1 MEDIUM NUCLEI EPSS 0.14
Ibenic Simple Giveaways < 2.36.2 - XSS
The method and share GET parameters of the Giveaway pages were not sanitised, validated or escaped before being output back in the pages, thus leading to reflected XSS
CWE-79 May 24, 2021
CVE-2021-24295 7.5 HIGH EXPLOITED NUCLEI EPSS 0.41
Cleantalk Spam Protection, Antispam, Firewall - SQL Injection
It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset.
CWE-89 May 17, 2021
CVE-2021-24288 6.1 MEDIUM NUCLEI EPSS 0.04
Acymailing < 7.5.0 - Open Redirect
When subscribing using AcyMailing, the 'redirect' parameter isn't properly sanitized. Turning the request from POST to GET, an attacker can craft a link containing a potentially malicious landing page and send it to the victim.
CWE-601 May 17, 2021
CVE-2021-24291 6.1 MEDIUM NUCLEI EPSS 0.15
10web Photo Gallery < 1.5.69 - XSS
The Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin before 1.5.69 was vulnerable to Reflected Cross-Site Scripting (XSS) issues via the gallery_id, tag, album_id and _id GET parameters passed to the bwg_frontend_data AJAX action (available to both unauthenticated and authenticated users)
CWE-79 May 14, 2021
CVE-2021-24287 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.22
Mooveagency Select All Categories And... - XSS
The settings page of the Select All Categories and Taxonomies, Change Checkbox to Radio Buttons WordPress plugin before 1.3.2 did not properly sanitise the tab parameter before outputting it back, leading to a reflected Cross-Site Scripting issue
CWE-79 May 14, 2021
CVE-2021-24286 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.52
Mooveagency Redirect 404 TO Parent < 1.3.1 - XSS
The settings page of the Redirect 404 to parent WordPress plugin before 1.3.1 did not properly sanitise the tab parameter before outputting it back, leading to a reflected Cross-Site Scripting issue
CWE-79 May 14, 2021
CVE-2021-24285 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.89
Cars-seller-auto-classifieds-script < 2.1.0 - SQL Injection
The request_list_request AJAX call of the Car Seller - Auto Classifieds Script WordPress plugin through 2.1.0, available to both authenticated and unauthenticated users, does not sanitise, validate or escape the order_id POST parameter before using it in a SQL statement, leading to a SQL Injection issue.
CWE-89 May 14, 2021