Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
4,077 results Clear all
CVE-2025-49493 5.8 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.01
Akamai CloudTest <60 - XXE Injection
Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection.
CWE-611 Jun 30, 2025
CVE-2025-52207 9.9 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.10
MikoPBX <2024.1.114 - Code Injection
PBXCoreREST/Controllers/Files/PostController.php in MikoPBX through 2024.1.114 allows uploading a PHP script to an arbitrary directory.
CWE-23 Jun 27, 2025
CVE-2025-34045 7.5 HIGH EXPLOITED NUCLEI EPSS 0.28
WeiPHP 5.0 - Path Traversal
A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
CWE-22 Jun 26, 2025
CVE-2025-4334 9.8 CRITICAL 5 PoCs Analysis NUCLEI EPSS 0.34
Najeebmedia Simple User Registration - Improper Privilege Management
The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator.
CWE-269 Jun 26, 2025
CVE-2025-20281 10.0 CRITICAL KEV 4 PoCs Analysis NUCLEI EPSS 0.36
Cisco ISE - RCE
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
CWE-74 Jun 25, 2025
CVE-2025-48954 8.1 HIGH NUCLEI EPSS 0.10
Discourse <3.5.0.beta6 - XSS
Discourse is an open-source discussion platform. Versions prior to 3.5.0.beta6 are vulnerable to cross-site scripting when the content security policy isn't enabled when using social logins. Version 3.5.0.beta6 patches the issue. As a workaround, have the content security policy enabled.
CWE-79 Jun 25, 2025
CVE-2025-34040 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.06
Zhiyuan OA - RCE
An arbitrary file upload vulnerability exists in the Zhiyuan OA platform via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-01 UTC.
CWE-22 Jun 24, 2025
CVE-2025-34038 7.5 HIGH EXPLOITED NUCLEI EPSS 0.05
Weaver e-cology 8.0 - SQL Injection
A SQL injection vulnerability exists in Weaver E-cology 8.0 via the getdata.jsp endpoint. The application directly passes unsanitized user input from the sql parameter into a database query within the getSelectAllIds(sql, type) method, reachable through the cmd=getSelectAllId workflow in the AjaxManager. This allows unauthenticated attackers to execute arbitrary SQL queries, potentially exposing sensitive data such as administrator password hashes. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
CWE-89 Jun 24, 2025
CVE-2025-34035 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.10
EnGenius EnShare Cloud Service <1.4.11 - Command Injection
An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise. Exploitation evidence was observed by the Shadowserver Foundation on 2024-12-05 UTC.
CWE-78 Jun 24, 2025
CVE-2025-34032 6.1 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.00
Moodle LMS Jmol <6.1 - XSS
A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
CWE-79 Jun 24, 2025
CVE-2025-34031 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.18
Moodle LMS Jmol plugin <6.1 - Path Traversal
A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
CWE-22 Jun 24, 2025
CVE-2025-6403 7.3 HIGH EXPLOITED NUCLEI EPSS 0.01
Fabian School Fees Payment System - Injection
A vulnerability was found in code-projects School Fees Payment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /student.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-74 Jun 21, 2025
CVE-2025-52488 8.6 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.24
Dnnsoftware Dotnetnuke < 10.0.1 - Information Disclosure
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. In versions 6.0.0 to before 10.0.1, DNN.PLATFORM allows a specially crafted series of malicious interaction to potentially expose NTLM hashes to a third party SMB server. This issue has been patched in version 10.0.1.
CWE-200 Jun 21, 2025
CVE-2025-34023 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.03
Karel IP1211 - Path Traversal
A path traversal vulnerability exists in the Karel IP1211 IP Phone's web management panel. The /cgi-bin/cgiServer.exx endpoint fails to properly sanitize user input to the page parameter, allowing remote authenticated attackers to access arbitrary files on the underlying system by using crafted path traversal sequences. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
CWE-22 Jun 20, 2025
CVE-2025-25037 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.02
Aquatronica Controller System <= 5.1.6 - Information Disclosure
An information disclosure vulnerability exists in Aquatronica Controller System firmware versions <= 5.1.6 and web interface versions <= 2.0. The tcp.php endpoint fails to restrict unauthenticated access, allowing remote attackers to issue crafted POST requests and retrieve sensitive configuration data, including plaintext administrative credentials. Exploitation of this flaw can lead to full compromise of the system, enabling unauthorized manipulation of connected devices and aquarium parameters.
CWE-200 Jun 20, 2025
CVE-2025-25034 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.73
SugarCRM - Unauthenticated Remote Code Execution via PHP Object Injection
A PHP object injection vulnerability exists in SugarCRM versions prior to 6.5.24, 6.7.13, 7.5.2.5, 7.6.2.2, and 7.7.1.0 due to improper validation of PHP serialized input in the SugarRestSerialize.php script. The vulnerable code fails to sanitize the rest_data parameter before passing it to the unserialize() function. This allows an unauthenticated attacker to submit crafted serialized data containing malicious object declarations, resulting in arbitrary code execution within the application context. Although SugarCRM released a prior fix in advisory sugarcrm-sa-2016-001, the patch was incomplete and failed to address some vectors. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-13 UTC.
CWE-502 Jun 20, 2025
CVE-2025-49132 10.0 CRITICAL EXPLOITED 43 PoCs Analysis NUCLEI EPSS 0.16
Pterodactyl Panel < 1.11.11 - Code Injection
Pterodactyl is a free, open-source game server management panel. Prior to version 1.11.11, using the /locales/locale.json with the locale and namespace query parameters, a malicious actor is able to execute arbitrary code without being authenticated. With the ability to execute arbitrary code it could be used to gain access to the Panel's server, read credentials from the Panel's config, extract sensitive information from the database, access files of servers managed by the panel, etc. This issue has been patched in version 1.11.11. There are no software workarounds for this vulnerability, but use of an external Web Application Firewall (WAF) could help mitigate this attack.
CWE-94 Jun 20, 2025
CVE-2025-1562 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.20
Funnelkit Automations < 3.6.0 - Missing Authorization
The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_plugins() function and a weak nonce hash in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to install arbitrary plugins on the site that can be leveraged to further infect a vulnerable site.
CWE-862 Jun 18, 2025
CVE-2025-49825 9.8 CRITICAL NUCLEI EPSS 0.18
Gravitational Teleport < 17.5.2 - Incorrect Authorization
Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch.
CWE-863 Jun 17, 2025
CVE-2025-34509 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.18
Sitecore Experience Commerce < 10.4 - Hard-coded Credentials
Sitecore Experience Manager (XM) and Experience Platform (XP) versions 10.1 to 10.1.4 rev. 011974 PRE, all versions of 10.2, 10.3 to 10.3.3 rev. 011967 PRE, and 10.4 to 10.4.1 rev. 011941 PRE contain a hardcoded user account. Unauthenticated and remote attackers can use this account to access administrative API over HTTP.
CWE-798 Jun 17, 2025