Vulnerabilities with Nuclei Scanner Templates
Updated 33m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2025-51501
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.00
Microweber CMS2.0 - XSS
Reflected Cross-Site Scripting (XSS) in the id parameter of the live_edit.module_settings API endpoint in Microweber CMS2.0 allows execution of arbitrary JavaScript.
CWE-79
Aug 01, 2025
CVE-2025-8286
CRITICAL
NUCLEI
EPSS 0.01
Güralp Systems FMUS Series - Unauthenticated Access
The affected products expose an unauthenticated Telnet-based command line interface that could allow an attacker to modify hardware configurations, manipulate data, or factory reset the device.
CWE-306
Jul 31, 2025
CVE-2025-54589
6.3
MEDIUM
2 PoCs
Analysis
NUCLEI
EPSS 0.01
9001 Copyparty < 1.18.7 - Basic XSS
Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users. This is fixed in version 1.18.7.
CWE-80
Jul 31, 2025
CVE-2025-53558
8.8
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.12
ZTE Japan K.K. - Auth Bypass
ZXHN-F660T and ZXHN-F660A provided by ZTE Japan K.K. use a common credential for all installations. With the knowledge of the credential, an attacker may log in to the affected devices.
CWE-1391
Jul 31, 2025
CVE-2025-44137
8.2
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.00
Maptiler Tileserver Php - Path Traversal
MapTiler Tileserver-php v2.0 is vulnerable to Directory Traversal. The renderTile function within tileserver.php is responsible for delivering tiles that are stored as files on the server via web request. Creating the path to a file allows the insertion of "../" and thus read any file on the web server. Affected GET parameters are "TileMatrix", "TileRow", "TileCol" and "Format"
CWE-22
Jul 29, 2025
CVE-2025-44136
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.11
Maptiler Tileserver Php - XSS
MapTiler Tileserver-php v2.0 is vulnerable to Cross Site Scripting (XSS). The GET parameter "layer" is reflected in an error message without html encoding. This leads to XSS and allows an unauthenticated attacker to execute arbitrary HTML or JavaScript code on a victim's browser.
CWE-79
Jul 29, 2025
CVE-2025-8266
6.3
MEDIUM
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.01
Chancms < 3.1.3 - Insecure Deserialization
A vulnerability has been found in yanyutao0402 ChanCMS up to 3.1.2 and classified as critical. Affected by this vulnerability is the function getArticle of the file app/modules/cms/controller/collect.js. The manipulation of the argument targetUrl leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. It is recommended to upgrade the affected component.
CWE-502
Jul 28, 2025
CVE-2025-32429
9.8
CRITICAL
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.28
XWiki Platform - SQL Injection
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2, it's possible for anyone to inject SQL using the parameter sort of the getdeleteddocuments.vm. It's injected as is as an ORDER BY value. This is fixed in versions 16.10.6 and 17.3.0-rc-1.
CWE-89
Jul 24, 2025
CVE-2025-6174
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.01
Qwizcards | online quizzes and flashcards <3.9.4 - XSS
The Qwizcards | online quizzes and flashcards WordPress plugin through 3.9.4 does not sanitise and escape the "_stylesheet" parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin or any other user.
Jul 23, 2025
CVE-2025-51482
8.8
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.06
Letta <0.7.12 - RCE
Remote Code Execution in letta.server.rest_api.routers.v1.tools.run_tool_from_source in letta-ai Letta 0.7.12 allows remote attackers to execute arbitrary Python code and system commands via crafted payloads to the /v1/tools/run endpoint, bypassing intended sandbox restrictions.
CWE-94
Jul 22, 2025
CVE-2025-34143
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.02
ETQ Reliance CG - Auth Bypass
An authentication bypass vulnerability exists in ETQ Reliance on the CG (legacy) platform. The application allowed login as the privileged internal SYSTEM user by manipulating the username field. The SYSTEM account does not require a password, enabling attackers with network access to the login page to obtain elevated access. Once authenticated, an attacker could achieve remote code execution by modifying Jython scripts within the application. This issue was resolved by introducing stricter validation logic to exclude internal accounts from public authentication workflows in version MP-4583.
CWE-269
Jul 22, 2025
CVE-2025-34141
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.01
ETQ Reliance CG - XSS
A reflected cross-site scripting (XSS) vulnerability exists in ETQ Reliance CG (legacy) platform within the `SQLConverterServlet` component. This vulnerability requires user interaction, such as clicking a crafted link, and may result in execution of unauthorized scripts in the user's context. The affected servlet was unnecessarily exposed to authenticated users and has since been disabled in version SE.2025.1.
CWE-116
Jul 22, 2025
CVE-2025-36845
8.6
HIGH
NUCLEI
EPSS 0.04
Eveo Urve Web Manager - SSRF
An issue was discovered in Eveo URVE Web Manager 27.02.2025. The endpoint /_internal/redirect.php allows for Server-Side Request Forgery (SSRF). The endpoint takes a URL as input, sends a request to this address, and reflects the content in the response. This can be used to request endpoints only reachable by the application server.
CWE-918
Jul 21, 2025
CVE-2025-53771
6.5
MEDIUM
EXPLOITED
RANSOMWARE
NUCLEI
EPSS 0.48
Microsoft SharePoint Server ToolPane Unauthenticated Remote Code Execution (aka ToolShell)
Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
CWE-287
Jul 20, 2025
CVE-2025-53770
9.8
CRITICAL
KEV
RANSOMWARE
52 PoCs
Analysis
NUCLEI
EPSS 0.90
Microsoft SharePoint Server - Code Injection
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network.
Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild.
Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
CWE-502
Jul 20, 2025
CVE-2025-6197
4.2
MEDIUM
NUCLEI
EPSS 0.01
Grafana OSS - Open Redirect
An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.
Prerequisites for exploitation:
- Multiple organizations must exist in the Grafana instance
- Victim must be on a different organization than the one specified in the URL
CWE-601
Jul 18, 2025
CVE-2025-54068
9.8
CRITICAL
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.53
Laravel Livewire < 3.6.4 - Code Injection
Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction. This issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible. No known workarounds are available.
CWE-94
Jul 17, 2025
CVE-2025-25257
9.8
CRITICAL
KEV
18 PoCs
Analysis
NUCLEI
EPSS 0.22
Fortinet FortiWeb - SQL Injection
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.7, FortiWeb 7.2.0 through 7.2.10, FortiWeb 7.0.0 through 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.
CWE-89
Jul 17, 2025
CVE-2025-3415
4.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.00
Grafana - Information Disclosure
Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission.
Fixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01
CWE-200
Jul 17, 2025
CVE-2025-4302
5.3
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.01
Stop User Enumeration <1.7.3 - Auth Bypass
The Stop User Enumeration WordPress plugin before version 1.7.3 blocks REST API /wp-json/wp/v2/users/ requests for non-authorized users. However, this can be bypassed by URL-encoding the API path.
Jul 17, 2025