Vulnerabilities with Nuclei Scanner Templates

Updated 33m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
4,077 results Clear all
CVE-2025-51501 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.00
Microweber CMS2.0 - XSS
Reflected Cross-Site Scripting (XSS) in the id parameter of the live_edit.module_settings API endpoint in Microweber CMS2.0 allows execution of arbitrary JavaScript.
CWE-79 Aug 01, 2025
CVE-2025-8286 CRITICAL NUCLEI EPSS 0.01
Güralp Systems FMUS Series - Unauthenticated Access
The affected products expose an unauthenticated Telnet-based command line interface that could allow an attacker to modify hardware configurations, manipulate data, or factory reset the device.
CWE-306 Jul 31, 2025
CVE-2025-54589 6.3 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.01
9001 Copyparty < 1.18.7 - Basic XSS
Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users. This is fixed in version 1.18.7.
CWE-80 Jul 31, 2025
CVE-2025-53558 8.8 HIGH 1 PoC Analysis NUCLEI EPSS 0.12
ZTE Japan K.K. - Auth Bypass
ZXHN-F660T and ZXHN-F660A provided by ZTE Japan K.K. use a common credential for all installations. With the knowledge of the credential, an attacker may log in to the affected devices.
CWE-1391 Jul 31, 2025
CVE-2025-44137 8.2 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.00
Maptiler Tileserver Php - Path Traversal
MapTiler Tileserver-php v2.0 is vulnerable to Directory Traversal. The renderTile function within tileserver.php is responsible for delivering tiles that are stored as files on the server via web request. Creating the path to a file allows the insertion of "../" and thus read any file on the web server. Affected GET parameters are "TileMatrix", "TileRow", "TileCol" and "Format"
CWE-22 Jul 29, 2025
CVE-2025-44136 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.11
Maptiler Tileserver Php - XSS
MapTiler Tileserver-php v2.0 is vulnerable to Cross Site Scripting (XSS). The GET parameter "layer" is reflected in an error message without html encoding. This leads to XSS and allows an unauthenticated attacker to execute arbitrary HTML or JavaScript code on a victim's browser.
CWE-79 Jul 29, 2025
CVE-2025-8266 6.3 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.01
Chancms < 3.1.3 - Insecure Deserialization
A vulnerability has been found in yanyutao0402 ChanCMS up to 3.1.2 and classified as critical. Affected by this vulnerability is the function getArticle of the file app/modules/cms/controller/collect.js. The manipulation of the argument targetUrl leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. It is recommended to upgrade the affected component.
CWE-502 Jul 28, 2025
CVE-2025-32429 9.8 CRITICAL EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.28
XWiki Platform - SQL Injection
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2, it's possible for anyone to inject SQL using the parameter sort of the getdeleteddocuments.vm. It's injected as is as an ORDER BY value. This is fixed in versions 16.10.6 and 17.3.0-rc-1.
CWE-89 Jul 24, 2025
CVE-2025-6174 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.01
Qwizcards | online quizzes and flashcards <3.9.4 - XSS
The Qwizcards | online quizzes and flashcards WordPress plugin through 3.9.4 does not sanitise and escape the "_stylesheet" parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin or any other user.
Jul 23, 2025
CVE-2025-51482 8.8 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.06
Letta <0.7.12 - RCE
Remote Code Execution in letta.server.rest_api.routers.v1.tools.run_tool_from_source in letta-ai Letta 0.7.12 allows remote attackers to execute arbitrary Python code and system commands via crafted payloads to the /v1/tools/run endpoint, bypassing intended sandbox restrictions.
CWE-94 Jul 22, 2025
CVE-2025-34143 CRITICAL EXPLOITED NUCLEI EPSS 0.02
ETQ Reliance CG - Auth Bypass
An authentication bypass vulnerability exists in ETQ Reliance on the CG (legacy) platform. The application allowed login as the privileged internal SYSTEM user by manipulating the username field. The SYSTEM account does not require a password, enabling attackers with network access to the login page to obtain elevated access. Once authenticated, an attacker could achieve remote code execution by modifying Jython scripts within the application. This issue was resolved by introducing stricter validation logic to exclude internal accounts from public authentication workflows in version MP-4583.
CWE-269 Jul 22, 2025
CVE-2025-34141 MEDIUM EXPLOITED NUCLEI EPSS 0.01
ETQ Reliance CG - XSS
A reflected cross-site scripting (XSS) vulnerability exists in ETQ Reliance CG (legacy) platform within the `SQLConverterServlet` component. This vulnerability requires user interaction, such as clicking a crafted link, and may result in execution of unauthorized scripts in the user's context. The affected servlet was unnecessarily exposed to authenticated users and has since been disabled in version SE.2025.1.
CWE-116 Jul 22, 2025
CVE-2025-36845 8.6 HIGH NUCLEI EPSS 0.04
Eveo Urve Web Manager - SSRF
An issue was discovered in Eveo URVE Web Manager 27.02.2025. The endpoint /_internal/redirect.php allows for Server-Side Request Forgery (SSRF). The endpoint takes a URL as input, sends a request to this address, and reflects the content in the response. This can be used to request endpoints only reachable by the application server.
CWE-918 Jul 21, 2025
CVE-2025-53771 6.5 MEDIUM EXPLOITED RANSOMWARE NUCLEI EPSS 0.48
Microsoft SharePoint Server ToolPane Unauthenticated Remote Code Execution (aka ToolShell)
Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
CWE-287 Jul 20, 2025
CVE-2025-53770 9.8 CRITICAL KEV RANSOMWARE 52 PoCs Analysis NUCLEI EPSS 0.90
Microsoft SharePoint Server - Code Injection
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
CWE-502 Jul 20, 2025
CVE-2025-6197 4.2 MEDIUM NUCLEI EPSS 0.01
Grafana OSS - Open Redirect
An open redirect vulnerability has been identified in Grafana OSS organization switching functionality. Prerequisites for exploitation: - Multiple organizations must exist in the Grafana instance - Victim must be on a different organization than the one specified in the URL
CWE-601 Jul 18, 2025
CVE-2025-54068 9.8 CRITICAL KEV 5 PoCs Analysis NUCLEI EPSS 0.53
Laravel Livewire < 3.6.4 - Code Injection
Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction. This issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible. No known workarounds are available.
CWE-94 Jul 17, 2025
CVE-2025-25257 9.8 CRITICAL KEV 18 PoCs Analysis NUCLEI EPSS 0.22
Fortinet FortiWeb - SQL Injection
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.7, FortiWeb 7.2.0 through 7.2.10, FortiWeb 7.0.0 through 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.
CWE-89 Jul 17, 2025
CVE-2025-3415 4.3 MEDIUM EXPLOITED NUCLEI EPSS 0.00
Grafana - Information Disclosure
Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. Fixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01
CWE-200 Jul 17, 2025
CVE-2025-4302 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.01
Stop User Enumeration <1.7.3 - Auth Bypass
The Stop User Enumeration WordPress plugin before version 1.7.3 blocks REST API /wp-json/wp/v2/users/ requests for non-authorized users. However, this can be bypassed by URL-encoding the API path.
Jul 17, 2025