Vulnerabilities with Nuclei Scanner Templates
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2025-34300
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.68
Template Injection Vulnerability in Sawtooth Software
A template injection vulnerability exists in Sawtooth Software’s Lighthouse Studio versions prior to 9.16.14 via the ciwweb.pl http://ciwweb.pl/ Perl web application. Exploitation allows an unauthenticated attacker can execute arbitrary commands.
CWE-1336
Jul 16, 2025
CVE-2025-5394
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.17
Alone - Charity Multipurpose Non-profit WordPress Theme <7.8.3 - RCE
The Alone – Charity Multipurpose Non-profit WordPress Theme theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the alone_import_pack_install_plugin() function in all versions up to, and including, 7.8.3. This makes it possible for unauthenticated attackers to upload zip files containing webshells disguised as plugins from remote locations to achieve remote code execution. CVE-2025-54019 is likely a duplicate of this.
CWE-862
Jul 15, 2025
CVE-2025-53833
10.0
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.17
LaRecipe <2.8.1 - SSRF/RCE
LaRecipe is an application that allows users to create documentation with Markdown inside a Laravel app. Versions prior to 2.8.1 are vulnerable to Server-Side Template Injection (SSTI), which could potentially lead to Remote Code Execution (RCE) in vulnerable configurations. Attackers could execute arbitrary commands on the server, access sensitive environment variables, and/or escalate access depending on server configuration. Users are strongly advised to upgrade to version v2.8.1 or later to receive a patch.
CWE-1336
Jul 14, 2025
CVE-2025-6058
9.8
CRITICAL
4 PoCs
Analysis
NUCLEI
EPSS 0.22
WPBookit <1.0.4 - File Upload
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Jul 12, 2025
CVE-2025-6851
7.2
HIGH
EXPLOITED
NUCLEI
EPSS 0.02
Broken Link Notifier <1.3.0 - SSRF
The Broken Link Notifier plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.0 via the ajax_blinks() function which ultimately calls the check_url_status_code() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
CWE-918
Jul 11, 2025
CVE-2025-47813
4.3
MEDIUM
KEV
1 Writeup
NUCLEI
EPSS 0.23
Wftpserver Wing FTP Server < 7.4.4 - Error Information Exposure
loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application when using a long value in the UID cookie.
CWE-209
Jul 10, 2025
CVE-2025-47812
10.0
CRITICAL
KEV
24 PoCs
Analysis
NUCLEI
EPSS 0.92
Wing FTP Server NULL-byte Authentication Bypass (CVE-2025-47812)
In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
CWE-158
Jul 10, 2025
CVE-2025-53364
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.00
Parse Server <7.5.3-8.2.2 - Info Disclosure
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Starting in 5.3.0 and before 7.5.3 and 8.2.2, the Parse Server GraphQL API previously allowed public access to the GraphQL schema without requiring a session token or the master key. While schema introspection reveals only metadata and not actual data, this metadata can still expand the potential attack surface. This vulnerability is fixed in 7.5.3 and 8.2.2.
CWE-497
Jul 10, 2025
CVE-2025-6970
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.33
Pixelite Events Manager < 6.6.5 - SQL Injection
The Events Manager – Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 7.0.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Jul 09, 2025
CVE-2025-53624
10.0
CRITICAL
1 Writeup
NUCLEI
EPSS 0.09
Docusaurus-plugin-content-gists <4.0.0 - Info Disclosure
The Docusaurus gists plugin adds a page to your Docusaurus instance, displaying all public gists of a GitHub user. docusaurus-plugin-content-gists versions prior to 4.0.0 are vulnerable to exposing GitHub Personal Access Tokens in production build artifacts when passed through plugin configuration options. The token, intended for build-time API access only, is inadvertently included in client-side JavaScript bundles, making it accessible to anyone who can view the website's source code. This vulnerability is fixed in 4.0.0.
CWE-200
Jul 09, 2025
CVE-2025-44177
8.2
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.09
WSS Protop - Path Traversal
A directory traversal vulnerability was discovered in White Star Software Protop version 4.4.2-2024-11-27, specifically in the /pt3upd/ endpoint. An unauthenticated attacker can remotely read arbitrary files on the underlying OS using encoded traversal sequences.
CWE-22
Jul 09, 2025
CVE-2025-34077
CRITICAL
6 PoCs
Analysis
NUCLEI
EPSS 0.72
WordPress Pie Register <3.7.1.4 - Auth Bypass
An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators. Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server.
CWE-306
Jul 09, 2025
CVE-2025-49533
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.74
Adobe Experience Manager < 6.5.23.0 - Insecure Deserialization
Adobe Experience Manager (MS) versions 6.5.23.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction. Scope is unchanged.
CWE-502
Jul 08, 2025
CVE-2025-49706
6.5
MEDIUM
KEV
RANSOMWARE
3 PoCs
Analysis
NUCLEI
EPSS 0.74
Microsoft Sharepoint Enterprise Server - Authentication Bypass
Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
CWE-287
Jul 08, 2025
CVE-2025-7160
7.3
HIGH
NUCLEI
EPSS 0.02
Phpgurukul Zoo Management System - Injection
A vulnerability classified as critical has been found in PHPGurukul Zoo Management System 2.1. This affects an unknown part of the file /admin/index.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-74
Jul 08, 2025
CVE-2025-5961
7.2
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.02
Wpvivid Migration, Backup, Staging - Unrestricted File Upload
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpvivid_upload_import_files' function in all versions up to, and including, 0.9.116. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents access on Apache servers.
CWE-434
Jul 03, 2025
CVE-2025-34073
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.55
stamparm/maltrail <=0.54 - Command Injection
An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process.
CWE-306
Jul 02, 2025
CVE-2025-4380
8.1
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.17
Scripteo Ads Pro < 4.89 - Remote File Inclusion
The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the site.
CWE-98
Jul 02, 2025
CVE-2025-49029
9.1
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.00
bitto.Kazi Custom Login And Signup Widget <1.0 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in bitto.kazi Custom Login And Signup Widget custom-login-and-signup-widget allows Code Injection.This issue affects Custom Login And Signup Widget: from n/a through <= 1.0.
CWE-94
Jul 01, 2025
CVE-2025-6934
9.8
CRITICAL
14 PoCs
Analysis
NUCLEI
EPSS 0.24
Opal Estate Pro - Property Management and Submission <=1.7.5 - Privilege Escalation
The Opal Estate Pro – Property Management and Submission plugin for WordPress, used by the FullHouse - Real Estate Responsive WordPress Theme, is vulnerable to privilege escalation via in all versions up to, and including, 1.7.5. This is due to a lack of role restriction during registration in the 'on_regiser_user' function. This makes it possible for unauthenticated attackers to arbitrarily choose the role, including the Administrator role, assigned when registering.
CWE-269
Jul 01, 2025