Vulnerabilities with Nuclei Scanner Templates

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,482 CVEs tracked 53,635 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,335 vendors 43,883 researchers
4,077 results Clear all
CVE-2021-24227 7.5 HIGH EXPLOITED NUCLEI EPSS 0.39
Patreon Wordpress < 1.7.0 - Information Disclosure
The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.
CWE-200 Apr 12, 2021
CVE-2021-24226 7.5 HIGH NUCLEI EPSS 0.25
Accessally < 3.5.7 - Information Disclosure
In the AccessAlly WordPress plugin before 3.5.7, the file "resource/frontend/product/product-shortcode.php" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required.
CWE-200 Apr 12, 2021
CVE-2021-24220 9.1 CRITICAL EXPLOITED NUCLEI EPSS 0.64
Thrivethemes Focusblog < 2.0.0 - Unrestricted File Upload
Thrive “Legacy” Rise by Thrive Themes WordPress theme before 2.0.0, Luxe by Thrive Themes WordPress theme before 2.0.0, Minus by Thrive Themes WordPress theme before 2.0.0, Ignition by Thrive Themes WordPress theme before 2.0.0, FocusBlog by Thrive Themes WordPress theme before 2.0.0, Squared by Thrive Themes WordPress theme before 2.0.0, Voice WordPress theme before 2.0.0, Performag by Thrive Themes WordPress theme before 2.0.0, Pressive by Thrive Themes WordPress theme before 2.0.0, Storied by Thrive Themes WordPress theme before 2.0.0 register a REST API endpoint to compress images using the Kraken image optimization engine. By supplying a crafted request in combination with data inserted using the Option Update vulnerability, it was possible to use this endpoint to retrieve malicious code from a remote URL and overwrite an existing file on the site with it or create a new file.This includes executable PHP files that contain malicious code.
CWE-434 Apr 12, 2021
CVE-2021-24219 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.16
Thrivethemes Focusblog < 2.0.0 - Improper Access Control
The Thrive Optimize WordPress plugin before 1.4.13.3, Thrive Comments WordPress plugin before 1.4.15.3, Thrive Headline Optimizer WordPress plugin before 1.3.7.3, Thrive Leads WordPress plugin before 2.3.9.4, Thrive Ultimatum WordPress plugin before 2.3.9.4, Thrive Quiz Builder WordPress plugin before 2.3.9.4, Thrive Apprentice WordPress plugin before 2.3.9.4, Thrive Visual Editor WordPress plugin before 2.6.7.4, Thrive Dashboard WordPress plugin before 2.3.9.3, Thrive Ovation WordPress plugin before 2.4.5, Thrive Clever Widgets WordPress plugin before 1.57.1 and Rise by Thrive Themes WordPress theme before 2.0.0, Ignition by Thrive Themes WordPress theme before 2.0.0, Luxe by Thrive Themes WordPress theme before 2.0.0, FocusBlog by Thrive Themes WordPress theme before 2.0.0, Minus by Thrive Themes WordPress theme before 2.0.0, Squared by Thrive Themes WordPress theme before 2.0.0, Voice WordPress theme before 2.0.0, Performag by Thrive Themes WordPress theme before 2.0.0, Pressive by Thrive Themes WordPress theme before 2.0.0, Storied by Thrive Themes WordPress theme before 2.0.0, Thrive Themes Builder WordPress theme before 2.2.4 register a REST API endpoint associated with Zapier functionality. While this endpoint was intended to require an API key in order to access, it was possible to access it by supplying an empty api_key parameter in vulnerable versions if Zapier was not enabled. Attackers could use this endpoint to add arbitrary data to a predefined option in the wp_options table.
CWE-284 Apr 12, 2021
CVE-2021-24215 9.8 CRITICAL NUCLEI EPSS 0.55
Wpruby Controlled Admin Access < 1.5.2 - Improper Access Control
An Improper Access Control vulnerability was discovered in the Controlled Admin Access WordPress plugin before 1.5.2. Uncontrolled access to the website customization functionality and global CMS settings, like /wp-admin/customization.php and /wp-admin/options.php, can lead to a complete compromise of the target resource.
CWE-284 Apr 12, 2021
CVE-2021-24213 6.1 MEDIUM NUCLEI EPSS 0.03
Givewp < 2.10.0 - XSS
The GiveWP – Donation Plugin and Fundraising Platform WordPress plugin before 2.10.0 was affected by a reflected Cross-Site Scripting vulnerability inside of the administration panel, via the 's' GET parameter on the Donors page.
CWE-79 Apr 12, 2021
CVE-2021-20021 9.8 CRITICAL KEV RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.92
Sonicwall Email Security < 10.0.9.6103 - Improper Privilege Management
A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.
CWE-269 Apr 09, 2021
CVE-2021-1472 5.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Cisco Rv160 Firmware < 1.0.01.03 - Authentication Bypass
Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-119 Apr 08, 2021
CVE-2021-24212 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.74
Woocommerce Help Scout < 2.9.1 - Unrestricted File Upload
The WooCommerce Help Scout WordPress plugin before 2.9.1 (https://woocommerce.com/products/woocommerce-help-scout/) allows unauthenticated users to upload any files to the site which by default will end up in wp-content/uploads/hstmp.
CWE-434 Apr 05, 2021
CVE-2021-24210 6.1 MEDIUM NUCLEI EPSS 0.35
Kiboit Phastpress < 1.111 - Open Redirect
There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain.
CWE-601 Apr 05, 2021
CVE-2021-24176 5.4 MEDIUM NUCLEI EPSS 0.37
JH 404 Logger < 1.1 - XSS
The JH 404 Logger WordPress plugin through 1.1 doesn't sanitise the referer and path of 404 pages, when they are output in the dashboard, which leads to executing arbitrary JavaScript code in the WordPress dashboard.
CWE-79 Apr 05, 2021
CVE-2021-24175 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.90
Posimyth The Plus Addons For Elementor < 4.1.7 - Authentication Bypass
The Plus Addons for Elementor Page Builder WordPress plugin before 4.1.7 was being actively exploited to by malicious actors to bypass authentication, allowing unauthenticated users to log in as any user (including admin) by just providing the related username, as well as create accounts with arbitrary roles, such as admin. These issues can be exploited even if registration is disabled, and the Login widget is not active.
CWE-287 Apr 05, 2021
CVE-2021-24170 7.5 HIGH EXPLOITED NUCLEI EPSS 0.42
Cozmoslabs User Profile Picture < 2.5.0 - Information Disclosure
The REST API endpoint get_users in the User Profile Picture WordPress plugin before 2.5.0 returned more information than was required for its functionality to users with the upload_files capability. This included password hashes, hashed user activation keys, usernames, emails, and other less sensitive information.
CWE-200 Apr 05, 2021
CVE-2021-24169 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.02
Algolplus Advanced Order Export For Woocommerce < 3.1.8 - XSS
This Advanced Order Export For WooCommerce WordPress plugin before 3.1.8 helps you to easily export WooCommerce order data. The tab parameter in the Admin Panel is vulnerable to reflected XSS.
CWE-79 Apr 05, 2021
CVE-2021-24165 6.1 MEDIUM NUCLEI EPSS 0.01
Ninjaforms Ninja Forms < 3.4.34 - Open Redirect
In the Ninja Forms Contact Form WordPress plugin before 3.4.34, the wp_ajax_nf_oauth_connect AJAX action was vulnerable to open redirect due to the use of a user supplied redirect parameter and no protection in place.
CWE-601 Apr 05, 2021
CVE-2021-24155 7.2 HIGH 3 PoCs Analysis NUCLEI EPSS 0.93
Backup-guard Backup Guard < 1.6.0 - Unrestricted File Upload
The WordPress Backup and Migrate Plugin – Backup Guard WordPress plugin before 1.6.0 did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE.
CWE-434 Apr 05, 2021
CVE-2021-24150 7.5 HIGH NUCLEI EPSS 0.56
Likebtn-like-button < 2.6.32 - SSRF
The LikeBtn WordPress Like Button Rating ♥ LikeBtn WordPress plugin before 2.6.32 was vulnerable to Unauthenticated Full-Read Server-Side Request Forgery (SSRF).
CWE-918 Apr 05, 2021
CVE-2021-21975 7.5 HIGH KEV RANSOMWARE 11 PoCs Analysis NUCLEI EPSS 0.94
Vmware Cloud Foundation - SSRF
Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975) prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials.
CWE-918 Mar 31, 2021
CVE-2021-22986 9.8 CRITICAL KEV RANSOMWARE 22 PoCs Analysis NUCLEI EPSS 0.94
F5 iControl REST Unauthenticated SSRF Token Generation RCE
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
CWE-918 Mar 31, 2021
CVE-2021-25161 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.02
Arubanetworks Instant < 6.4.4.8-4.2.4.18 - XSS
A remote cross-site scripting (xss) vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
CWE-79 Mar 30, 2021