Vulnerabilities with Nuclei Scanner Templates

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
4,077 results Clear all
CVE-2025-5777 7.5 HIGH KEV RANSOMWARE 29 PoCs Analysis NUCLEI EPSS 0.67
Citrix Netscaler Application Delivery... - Use of Uninitialized Resource
Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
CWE-125 Jun 17, 2025
CVE-2025-3515 8.1 HIGH EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.06
Codedropz Drag And Drop Multiple File... - Unrestricted File Upload
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all versions up to, and including, 1.3.8.9. This makes it possible for unauthenticated attackers to bypass the plugin's blacklist and upload .phar or other dangerous file types on the affected site's server, which may make remote code execution possible on the servers that are configured to handle .phar files as executable PHP scripts, particularly in default Apache+mod_php configurations where the file extension is not strictly validated before being passed to the PHP interpreter.
CWE-434 Jun 17, 2025
CVE-2025-49596 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.03
Modelcontextprotocol Inspector < 0.14.1 - Missing Authentication
The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities.
CWE-306 Jun 13, 2025
CVE-2025-45985 9.8 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.35
B-link Bl-wr9000 Firmware - Command Injection
Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 were discovered to contain a command injection vulnerability via the bs_SetSSIDHide function.
CWE-77 Jun 13, 2025
CVE-2025-5301 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.08
ONLYOFFICE Docs <8.3.1 - XSS
ONLYOFFICE Docs (DocumentServer) in versions equal and below 8.3.1 are affected by a reflected cross-site scripting (XSS) issue when opening files via the WOPI protocol. Attackers could inject malicious scripts via crafted HTTP POST requests, which are then reflected in the server's HTML response.
CWE-79 Jun 12, 2025
CVE-2025-30220 9.9 CRITICAL EXPLOITED NUCLEI EPSS 0.14
GeoServer WFS - XXE Processing Vulnerability
GeoServer is an open source server that allows users to share and edit geospatial data. GeoTools Schema class use of Eclipse XSD library to represent schema data structure is vulnerable to XML External Entity (XXE) exploit. This impacts whoever exposes XML processing with gt-xsd-core involved in parsing, when the documents carry a reference to an external XML schema. The gt-xsd-core Schemas class is not using the EntityResolver provided by the ParserHandler (if any was configured). This also impacts users of gt-wfs-ng DataStore where the ENTITY_RESOLVER connection parameter was not being used as intended. This vulnerability is fixed in GeoTools 33.1, 32.3, 31.7, and 28.6.1, GeoServer 2.27.1, 2.26.3, and 2.25.7, and GeoNetwork 4.4.8 and 4.2.13.
CWE-611 Jun 10, 2025
CVE-2025-27505 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.01
GeoServer - Missing Authorization on REST API Index
GeoServer is an open source server that allows users to share and edit geospatial data. It is possible to bypass the default REST API security and access the index page. The REST API security handles rest and its subpaths but not rest with an extension (e.g., rest.html). The REST API index can disclose whether certain extensions are installed. This vulnerability is fixed in 2.26.3 and 2.25.6. As a workaround, in ${GEOSERVER_DATA_DIR}/security/config.xml, change the paths for the rest filter to /rest.*,/rest/** and change the paths for the gwc filter to /gwc/rest.*,/gwc/rest/** and restart GeoServer.
CWE-862 Jun 10, 2025
CVE-2025-27817 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.20
Apache Kafka Client - Arbitrary File Read
A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Apache Kafka Clients accept configuration data for setting the SASL/OAUTHBEARER connection with the brokers, including "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url". Apache Kafka allows clients to read an arbitrary file and return the content in the error log, or sending requests to an unintended location. In applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers may use the "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url" configuratin to read arbitrary contents of the disk and environment variables or make requests to an unintended location. In particular, this flaw may be used in Apache Kafka Connect to escalate from REST API access to filesystem/environment/URL access, which may be undesirable in certain environments, including SaaS products. Since Apache Kafka 3.9.1/4.0.0, we have added a system property ("-Dorg.apache.kafka.sasl.oauthbearer.allowed.urls") to set the allowed urls in SASL JAAS configuration. In 3.9.1, it accepts all urls by default for backward compatibility. However in 4.0.0 and newer, the default value is empty list and users have to set the allowed urls explicitly.
CWE-918 Jun 10, 2025
CVE-2025-4652 6.1 MEDIUM NUCLEI EPSS 0.00
Broadstreet WordPress <1.51.8 - XSS
The Broadstreet WordPress plugin before 1.51.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CWE-79 Jun 09, 2025
CVE-2025-41646 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.34
Software Package - Auth Bypass
An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
CWE-704 Jun 06, 2025
CVE-2025-5701 8.8 HIGH 4 PoCs Analysis NUCLEI EPSS 0.13
HyperComments <1.2.2 - Privilege Escalation
The HyperComments plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hc_request_handler function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
CWE-862 Jun 05, 2025
CVE-2025-5569 6.3 MEDIUM 2 PoCs NUCLEI EPSS 0.01
IdeaCMS <1.8 - SQL Injection
A vulnerability was found in IdeaCMS up to 1.7 and classified as critical. This issue affects the function Article/Goods of the file /api/v1.index.article/getList.html. The manipulation of the argument Field leads to sql injection. The attack may be initiated remotely. Upgrading to version 1.8 is able to address this issue. The patch is named 935aceb4c21338633de6d41e13332f7b9db4fa6a. It is recommended to upgrade the affected component.
CWE-74 Jun 04, 2025
CVE-2025-45854 10.0 CRITICAL NUCLEI EPSS 0.21
Jehc-bpm < 2.0.1 - Missing Authorization
/server/executeExec of JEHC-BPM 2.0.1 allows attackers to execute arbitrary code via execParams.
CWE-862 Jun 03, 2025
CVE-2025-44148 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.15
Mailenable < 10.00 - XSS
Cross Site Scripting (XSS) vulnerability in MailEnable before v10 allows a remote attacker to execute arbitrary code via the failure.aspx component
CWE-79 Jun 03, 2025
CVE-2025-5086 9.0 CRITICAL KEV NUCLEI EPSS 0.44
DELMIA Apriso <2025 - Code Injection
A deserialization of untrusted data vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could lead to a remote code execution.
CWE-502 Jun 02, 2025
CVE-2025-49113 9.9 CRITICAL KEV 30 PoCs Analysis NUCLEI EPSS 0.90
Roundcube Webmail < 1.5.10 - Insecure Deserialization
Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.
CWE-502 Jun 02, 2025
CVE-2025-5287 7.5 HIGH EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.10
Likes and Dislikes Plugin <1.0.0 - SQL Injection
The Likes and Dislikes Plugin plugin for WordPress is vulnerable to SQL Injection via the 'post' parameter in all versions up to, and including, 1.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 May 28, 2025
CVE-2025-4009 CRITICAL EXPLOITED NUCLEI EPSS 0.13
Evertz SDVN 3080ipx-10G - Command Injection
The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named ‘ewb’ by Evertz. This web interface has two endpoints that are vulnerable to arbitrary command injection (CVE-2025-4009, CVE-2025-10364) and the authentication mechanism has a flaw leading to authentication bypass (CVE-2025-10365). CVE-2025-4009 covers the command injection in feature-transfer-import.php CVE-2025-10364 covers the command injection in feature-transfer-export.php Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices. This level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others.
CWE-77 May 28, 2025
CVE-2025-48828 9.0 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.74
vBulletin - RCE
Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.
CWE-424 May 27, 2025
CVE-2025-48827 10.0 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.78
vBulletin <6.0.3 - RCE
vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later, as demonstrated by the /api.php?method=protectedMethod pattern, as exploited in the wild in May 2025.
CWE-424 May 27, 2025