Vulnerabilities with Nuclei Scanner Templates
Updated 7m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2025-31131
8.6
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.08
Yeswiki < 4.5.2 - Unauthenticated Path Traversal
YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2.
CWE-22
Apr 01, 2025
CVE-2025-31125
5.3
MEDIUM
KEV
6 PoCs
Analysis
NUCLEI
EPSS 0.82
Vite Development Server - Path Traversal
Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.
CWE-284
Mar 31, 2025
CVE-2025-2294
9.8
CRITICAL
EXPLOITED
13 PoCs
Analysis
NUCLEI
EPSS 0.57
Kubio AI Page Builder <2.5.1 - Local File Inclusion
The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-22
Mar 28, 2025
CVE-2025-29306
9.8
CRITICAL
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.84
FoxCMS v.1.2.5 - Remote Code Execution
An issue in FoxCMS v.1.2.5 allows a remote attacker to execute arbitrary code via the case display page in the index.html component.
CWE-94
Mar 27, 2025
CVE-2025-30567
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.27
WordPress WP01 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP01 WP01 wp01 allows Path Traversal.This issue affects WP01: from n/a through <= 2.6.2.
CWE-22
Mar 25, 2025
CVE-2025-24514
8.8
HIGH
5 PoCs
Analysis
NUCLEI
EPSS 0.23
K8s.io Ingress-nginx < 1.11.5 - Improper Input Validation
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CWE-20
Mar 25, 2025
CVE-2025-1974
9.8
CRITICAL
30 PoCs
Analysis
NUCLEI
EPSS 0.90
Kubernetes - RCE
A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CWE-653
Mar 25, 2025
CVE-2025-1098
8.8
HIGH
4 PoCs
Analysis
NUCLEI
EPSS 0.34
Ingress-Nginx - RCE
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CWE-20
Mar 25, 2025
CVE-2025-1097
8.8
HIGH
4 PoCs
Analysis
NUCLEI
EPSS 0.21
Ingress-Nginx - RCE
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CWE-20
Mar 25, 2025
CVE-2025-2712
4.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.00
Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting
A vulnerability was found in Yonyou UFIDA ERP-NC 5.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /help/top.jsp. The manipulation of the argument langcode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-94
Mar 24, 2025
CVE-2025-2711
4.3
MEDIUM
NUCLEI
EPSS 0.00
Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting
A vulnerability was found in Yonyou UFIDA ERP-NC 5.0. It has been classified as problematic. Affected is an unknown function of the file /help/systop.jsp. The manipulation of the argument langcode leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-94
Mar 24, 2025
CVE-2025-2710
4.3
MEDIUM
NUCLEI
EPSS 0.00
Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting
A vulnerability was found in Yonyou UFIDA ERP-NC 5.0 and classified as problematic. This issue affects some unknown processing of the file /menu.jsp. The manipulation of the argument flag leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-94
Mar 24, 2025
CVE-2025-2709
4.3
MEDIUM
NUCLEI
EPSS 0.00
Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting
A vulnerability has been found in Yonyou UFIDA ERP-NC 5.0 and classified as problematic. This vulnerability affects unknown code of the file /login.jsp. The manipulation of the argument key/redirect leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-94
Mar 24, 2025
CVE-2025-2748
6.1
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.00
Kentico Xperience CMS - Unauthenticated Stored XSS
The Kentico Xperience application does not fully validate or filter files uploaded via the multiple-file upload functionality, which allows for stored XSS.This issue affects Kentico Xperience through 13.0.178.
CWE-434
Mar 24, 2025
CVE-2025-2747
9.8
CRITICAL
KEV
1 Writeup
NUCLEI
EPSS 0.89
Kentico Xperience 13 CMS - Staging Service Authentication Bypass (WT-2025-0006)
An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server component password handling for the server defined None type. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.178.
CWE-288
Mar 24, 2025
CVE-2025-2746
9.8
CRITICAL
KEV
1 Writeup
NUCLEI
EPSS 0.84
Kentico Xperience 13 CMS - Staging Service Authentication Bypass (WT-2025-0011)
An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server password handling of empty SHA1 usernames in digest authentication. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.172.
CWE-288
Mar 24, 2025
CVE-2025-30208
5.3
MEDIUM
EXPLOITED
34 PoCs
Analysis
NUCLEI
EPSS 0.89
Vite - Arbitrary File Read
Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.
CWE-284
Mar 24, 2025
CVE-2025-2610
7.6
HIGH
EXPLOITED
NUCLEI
EPSS 0.02
MagnusBilling Alarm Module - Cross-Site Scripting
Improper neutralization of input during web page generation vulnerability in MagnusSolution MagnusBilling (Alarm Module modules) allows authenticated stored cross-site scripting. This vulnerability is associated with program files protected/components/MagnusLog.Php.
This issue affects MagnusBilling: through 7.3.0.
CWE-79
Mar 21, 2025
CVE-2025-2609
8.2
HIGH
EXPLOITED
NUCLEI
EPSS 0.06
MagnusBilling Login Logs - Cross-Site Scripting
Improper neutralization of input during web page generation vulnerability in MagnusSolution MagnusBilling login logging allows unauthenticated users to store HTML content in the viewable log component accessible at /mbilling/index.php/logUsers/read" cross-site scripting This vulnerability is associated with program files protected/components/MagnusLog.Php.
This issue affects MagnusBilling: through 7.3.0.
CWE-79
Mar 21, 2025
CVE-2025-29927
9.1
CRITICAL
EXPLOITED
138 PoCs
Analysis
NUCLEI
EPSS 0.93
Next.js Middleware Bypass
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
CWE-285
Mar 21, 2025