Vulnerabilities with Nuclei Scanner Templates

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
4,077 results Clear all
CVE-2025-47646 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.00
Gilblas Ngunte Possi PSW Front-end Login & Registration <1.13 - Inf...
Weak Password Recovery Mechanism for Forgotten Password vulnerability in Gilblas Ngunte Possi PSW Front-end Login &amp; Registration psw-login-and-registration allows Password Recovery Exploitation.This issue affects PSW Front-end Login &amp; Registration: from n/a through <= 1.13.
CWE-640 May 23, 2025
CVE-2025-47539 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.28
Themewinter Eventin < 4.0.27 - Incorrect Privilege Assignment
Incorrect Privilege Assignment vulnerability in Arraytics Eventin wp-event-solution allows Privilege Escalation.This issue affects Eventin: from n/a through <= 4.0.26.
CWE-266 May 23, 2025
CVE-2025-32815 6.5 MEDIUM EXPLOITED NUCLEI EPSS 0.28
NetMRI < 7.6.1 - Authentication Bypass via Hardcoded Credentials
An issue was discovered in Infoblox NETMRI before 7.6.1. Authentication Bypass via a Hardcoded credential can occur.
CWE-287 May 22, 2025
CVE-2025-32814 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.32
NetMRI Unauthenticated SQL Injection via skipjackUsername
An issue was discovered in Infoblox NETMRI before 7.6.1. Unauthenticated SQL Injection can occur.
CWE-89 May 22, 2025
CVE-2025-32813 7.2 HIGH EXPLOITED NUCLEI EPSS 0.11
Infoblox NetMRI < 7.6.1 - Unauthenticated Command Injection in get_saml_request
An issue was discovered in Infoblox NETMRI before 7.6.1. Remote Unauthenticated Command Injection can occur.
CWE-77 May 22, 2025
CVE-2025-4123 7.6 HIGH EXPLOITED 11 PoCs Analysis NUCLEI EPSS 0.04
Grafana < 10.4.18 - XSS
A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
CWE-601 May 22, 2025
CVE-2025-34027 CRITICAL EXPLOITED NUCLEI EPSS 0.05
Versa Concerto - Auth Bypass & RCE
The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The Spack upload endpoint can be leveraged for a Time-of-Check to Time-of-Use (TOCTOU) write in combination with a race condition to achieve remote code execution via path loading manipulation, allowing an unauthenticated actor to achieve remote code execution (RCE).This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable.
CWE-367 May 21, 2025
CVE-2025-34026 7.5 HIGH KEV NUCLEI EPSS 0.72
Versa Concerto <12.2.0 - Auth Bypass
The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs.This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable.
CWE-288 May 21, 2025
CVE-2025-46822 HIGH 2 PoCs Analysis NUCLEI EPSS 0.07
OsamaTaher Java-springboot-codebase - Path Traversal
OsamaTaher/Java-springboot-codebase is a collection of Java and Spring Boot code snippets, applications, and projects. Prior to commit c835c6f7799eacada4c0fc77e0816f250af01ad2, insufficient path traversal mechanisms make absolute path traversal possible. This vulnerability allows unauthorized access to sensitive internal files. Commit c835c6f7799eacada4c0fc77e0816f250af01ad2 contains a patch for the issue.
CWE-36 May 21, 2025
CVE-2025-4008 8.8 HIGH KEV NUCLEI EPSS 0.44
Smartbedded Meteobridge VM < 6.2 - Command Injection
The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C. This web interface exposes an endpoint that is vulnerable to command injection. Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.
CWE-306 May 21, 2025
CVE-2025-4322 9.8 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.31
Motors WordPress <5.6.67 - Privilege Escalation
The Motors theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 5.6.67. This is due to the theme not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user passwords, including those of administrators, and leverage that to gain access to their account.
CWE-620 May 20, 2025
CVE-2025-47916 10.0 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.91
Invisioncommunity < 5.0.7 - Remote Code Execution
Invision Community 5.0.0 before 5.0.7 allows remote code execution via crafted template strings to themeeditor.php. The issue lies within the themeeditor controller (file: /applications/core/modules/front/system/themeeditor.php), where a protected method named customCss can be invoked by unauthenticated users. This method passes the value of the content parameter to the Theme::makeProcessFunction() method; hence it is evaluated by the template engine. Accordingly, this can be exploited by unauthenticated attackers to inject and execute arbitrary PHP code by providing crafted template strings.
CWE-1336 May 16, 2025
CVE-2025-40630 6.1 MEDIUM NUCLEI EPSS 0.01
Icewarp Mail Server - Open Redirect
Open redirection vulnerability in IceWarp Mail Server affecting version 11.4.0. This vulnerability allows an attacker to redirect a user to any domain by sending a malicious URL to the victim, for example “ https://icewarp.domain.com//<MALICIOUS_DOMAIN>/%2e%2e” https://icewarp.domain.com///%2e%2e” . This vulnerability has been tested in Firefox.
CWE-601 May 16, 2025
CVE-2025-1303 6.1 MEDIUM NUCLEI EPSS 0.00
Coffee-code Plugin Oficial < 1.8.1 - XSS
The Plugin Oficial WordPress plugin through 1.7.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against only unauthenticated users.
CWE-79 May 15, 2025
CVE-2025-0133 LOW 6 PoCs Analysis NUCLEI EPSS 0.02
Palo Alto Networks PAN-OS - XSS
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link. The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN. There is no availability impact to GlobalProtect features or GlobalProtect users. Attackers cannot use this vulnerability to tamper with or modify contents or configurations of the GlobalProtect portal or gateways. The integrity impact of this vulnerability is limited to enabling an attacker to create phishing and credential-stealing links that appear to be hosted on the GlobalProtect portal. For GlobalProtect users with Clientless VPN enabled, there is a limited impact on confidentiality due to inherent risks of Clientless VPN that facilitate credential theft. You can read more about this risk in the informational bulletin PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 . There is no impact to confidentiality for GlobalProtect users if you did not enable (or you disable) Clientless VPN.
CWE-79 May 14, 2025
CVE-2025-47445 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.09
Themewinter Eventin < 4.0.27 - Path Traversal
Relative Path Traversal vulnerability in Arraytics Eventin wp-event-solution allows Path Traversal.This issue affects Eventin: from n/a through <= 4.0.26.
CWE-23 May 14, 2025
CVE-2025-4427 5.3 MEDIUM KEV 4 PoCs Analysis NUCLEI EPSS 0.91
Ivanti Endpoint Manager Mobile < 11.12.0.5 - Authentication Bypass
An authentication bypass in the API component of Ivanti Endpoint Manager Mobile 12.5.0.0 and prior allows attackers to access protected resources without proper credentials via the API.
CWE-288 May 13, 2025
CVE-2025-47204 6.1 MEDIUM EXPLOITED 1 Writeup NUCLEI EPSS 0.01
Davidstutz Bootstrap Multiselect - CSRF
An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. A PHP script in the source code echoes arbitrary POST data. If a developer adopts this structure wholesale in a live application, it could create a Reflective Cross-Site Scripting (XSS) vulnerability exploitable through Cross-Site Request Forgery (CSRF).
CWE-352 May 13, 2025
CVE-2025-4632 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.49
Samsung MagicINFO <21.1052 - Path Traversal
Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1052 allows attackers to write arbitrary file as system authority.
CWE-22 May 13, 2025
CVE-2025-4396 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.22
Relevanssi - A Better Search <4.24.4, <=2.27.4 - SQL Injection
The Relevanssi – A Better Search plugin for WordPress is vulnerable to time-based SQL Injection via the cats and tags query parameters in all versions up to, and including, 4.24.4 (Free) and <= 2.27.5 (Premium) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries to already existing queries that can be used to extract sensitive information from the database.
CWE-89 May 13, 2025