Vulnerabilities with Nuclei Scanner Templates

Updated 33m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
4,077 results Clear all
CVE-2025-54726 9.3 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.01
Miguel Useche JS Archive List - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows SQL Injection.This issue affects JS Archive List: from n/a through < 6.1.6.
CWE-89 Aug 20, 2025
CVE-2025-57789 5.4 MEDIUM NUCLEI EPSS 0.07
Default Credential - Privilege Escalation
During the brief window between installation and the first administrator login, remote attackers may exploit the default credential to gain admin control. This is limited to the setup phase, before any jobs have been configured.
CWE-257 Aug 20, 2025
CVE-2025-57788 6.5 MEDIUM EXPLOITED NUCLEI EPSS 0.83
Commvault - Unauthenticated API Access
A vulnerability in a known login mechanism allows unauthenticated attackers to execute API calls without requiring user credentials. RBAC helps limit the exposure but does not eliminate risk.
CWE-259 Aug 20, 2025
CVE-2025-55303 6.1 MEDIUM EXPLOITED 1 Writeup NUCLEI EPSS 0.00
Astro <5.13.2, 4.16.18 - SSRF
Astro is a web framework for content-driven websites. In versions of astro before 5.13.2 and 4.16.18, the image optimization endpoint in projects deployed with on-demand rendering allows images from unauthorized third-party domains to be served. On-demand rendered sites built with Astro include an /_image endpoint which returns optimized versions of images. A bug in impacted versions of astro allows an attacker to bypass the third-party domain restrictions by using a protocol-relative URL as the image source, e.g. /_image?href=//example.com/image.png. This vulnerability is fixed in 5.13.2 and 4.16.18.
CWE-115 Aug 19, 2025
CVE-2025-8943 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
Flowise < 3.0.1 - Missing Authorization
The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
CWE-862 Aug 14, 2025
CVE-2025-55169 6.5 MEDIUM 1 Writeup NUCLEI EPSS 0.02
WeGIA <3.4.8 - Path Traversal
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, a path traversal vulnerability was discovered in the WeGIA application, html/socio/sistema/download_remessa.php endpoint. This vulnerability could allow an attacker to gain unauthorized access to local files in the server and sensitive information stored in config.php. config.php contains information that could allow direct access to the database. This issue has been patched in version 3.4.8.
CWE-22 Aug 12, 2025
CVE-2025-52970 8.1 HIGH EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.22
Fortinet FortiWeb <7.6.3 - Privilege Escalation
A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device and targeted user to gain admin privileges on the device via a specially crafted request.
CWE-233 Aug 12, 2025
CVE-2025-25256 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.45
Fortinet FortiSIEM - OS Command Injection
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests.
CWE-78 Aug 12, 2025
CVE-2025-55161 8.6 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.06
Stirling-PDF <1.1.0 - SSRF
Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, when using the /api/v1/convert/markdown/pdf endpoint to convert Markdown to PDF, the backend calls a third-party tool to process it and includes a sanitizer for security sanitization which can be bypassed and result in SSRF. This issue has been patched in version 1.1.0.
CWE-918 Aug 11, 2025
CVE-2025-25231 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.04
Omnissa Workspace ONE UEM - Path Traversal
Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability. A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints.
CWE-22 Aug 11, 2025
CVE-2025-34152 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.16
Shenzhen Aitemi M300 Wi-Fi Repeater - Command Injection
An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal date '-s' command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.
CWE-78 Aug 07, 2025
CVE-2025-47188 6.5 MEDIUM EXPLOITED NUCLEI EPSS 0.03
Mitel 6000 - OS Command Injection
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones through 6.4 SP4 (R6.4.0.4006), and the 6970 Conference Unit through 6.4 SP4 (R6.4.0.4006) or version V1 R0.1.0, could allow an unauthenticated attacker to conduct a command injection attack due to insufficient parameter sanitization. A successful exploit could allow an attacker to execute arbitrary commands within the context of the phone, leading to disclosure or modification of sensitive configuration data or affecting device availability and operation.
CWE-77 Aug 07, 2025
CVE-2025-54125 6.5 MEDIUM EXPLOITED 1 Writeup NUCLEI EPSS 0.01
XWiki Platform <17.1.0 - Info Disclosure
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki Platform Legacy Old Core and XWiki Platform Old Core versions 1.1 through 16.4.6, 16.5.0-rc-1 through 16.10.4 and 17.0.0-rc-1 through 17.1.0, the XML export of a page in XWiki that can be triggered by any user with view rights on a page by appending ?xpage=xml to the URL includes password and email properties stored on a document that aren't named password or email. This is fixed in versions 16.4.7, 16.10.5 and 17.2.0-rc-1. To work around this issue, the file templates/xml.vm in the deployed WAR can be deleted if the XML isn't needed. There isn't any feature in XWiki itself that depends on the XML export.
CWE-359 Aug 06, 2025
CVE-2025-32430 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.00
XWiki Platform - Cross-Site Scripting
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 4.2-milestone-3 through 16.4.7, 16.5.0-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2, two templates contain reflected XSS vulnerabilities, allowing an attacker to execute malicious JavaScript code in the context of the victim's session by getting the victim to visit an attacker-controlled URL. This permits the attacker to perform arbitrary actions using the permissions of the victim. This issue is fixed in versions 16.4.8, 16.10.6 and 17.3.0-rc-1. To workaround the issue, manually patch the WAR with the same changes as the original patch.
CWE-79 Aug 06, 2025
CVE-2025-2611 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.73
ICTBroadcast - Command Injection
The ICTBroadcast application unsafely passes session cookie data to shell processing, allowing an attacker to inject shell commands into a session cookie that get executed on the server. This results in unauthenticated remote code execution in the session handling. Versions 7.4 and below are known to be vulnerable.
CWE-78 Aug 05, 2025
CVE-2025-36604 7.3 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.13
Dell Unity Operating Environment < 5.5.1.0 - OS Command Injection
Dell Unity, version(s) 5.5 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution.
CWE-78 Aug 04, 2025
CVE-2025-6205 9.1 CRITICAL KEV NUCLEI EPSS 0.78
DELMIA Apriso <2025 - Privilege Escalation
A missing authorization vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to gain privileged access to the application.
CWE-862 Aug 04, 2025
CVE-2025-6204 8.0 HIGH KEV NUCLEI EPSS 0.08
DELMIA Apriso <2025 - Code Injection
An Improper Control of Generation of Code (Code Injection) vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to execute arbitrary code.
CWE-94 Aug 04, 2025
CVE-2025-54782 8.8 HIGH EXPLOITED 5 PoCs 2 Writeups Analysis NUCLEI EPSS 0.30
Nestjs Devtools-integration < 0.2.1 - Command Injection
Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (safe-eval-like implementation). Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine. The package adds HTTP endpoints to a locally running NestJS development server. One of these endpoints, /inspector/graph/interact, accepts JSON input containing a code field and executes the provided code in a Node.js vm.runInNewContext sandbox. This is fixed in version 0.2.1.
CWE-78 Aug 02, 2025
CVE-2025-51502 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.00
Microweber CMS 2.0 - XSS
Reflected Cross-Site Scripting (XSS) in Microweber CMS 2.0 via the layout parameter on the /admin/page/create page allows arbitrary JavaScript execution in the context of authenticated admin users.
CWE-79 Aug 01, 2025