Vulnerabilities with Nuclei Scanner Templates

Updated 7m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
4,077 results Clear all
CVE-2025-31131 8.6 HIGH 3 PoCs Analysis NUCLEI EPSS 0.08
Yeswiki < 4.5.2 - Unauthenticated Path Traversal
YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2.
CWE-22 Apr 01, 2025
CVE-2025-31125 5.3 MEDIUM KEV 6 PoCs Analysis NUCLEI EPSS 0.82
Vite Development Server - Path Traversal
Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.
CWE-284 Mar 31, 2025
CVE-2025-2294 9.8 CRITICAL EXPLOITED 13 PoCs Analysis NUCLEI EPSS 0.57
Kubio AI Page Builder <2.5.1 - Local File Inclusion
The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-22 Mar 28, 2025
CVE-2025-29306 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.84
FoxCMS v.1.2.5 - Remote Code Execution
An issue in FoxCMS v.1.2.5 allows a remote attacker to execute arbitrary code via the case display page in the index.html component.
CWE-94 Mar 27, 2025
CVE-2025-30567 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.27
WordPress WP01 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP01 WP01 wp01 allows Path Traversal.This issue affects WP01: from n/a through <= 2.6.2.
CWE-22 Mar 25, 2025
CVE-2025-24514 8.8 HIGH 5 PoCs Analysis NUCLEI EPSS 0.23
K8s.io Ingress-nginx < 1.11.5 - Improper Input Validation
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CWE-20 Mar 25, 2025
CVE-2025-1974 9.8 CRITICAL 30 PoCs Analysis NUCLEI EPSS 0.90
Kubernetes - RCE
A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CWE-653 Mar 25, 2025
CVE-2025-1098 8.8 HIGH 4 PoCs Analysis NUCLEI EPSS 0.34
Ingress-Nginx - RCE
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CWE-20 Mar 25, 2025
CVE-2025-1097 8.8 HIGH 4 PoCs Analysis NUCLEI EPSS 0.21
Ingress-Nginx - RCE
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CWE-20 Mar 25, 2025
CVE-2025-2712 4.3 MEDIUM EXPLOITED NUCLEI EPSS 0.00
Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting
A vulnerability was found in Yonyou UFIDA ERP-NC 5.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /help/top.jsp. The manipulation of the argument langcode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-94 Mar 24, 2025
CVE-2025-2711 4.3 MEDIUM NUCLEI EPSS 0.00
Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting
A vulnerability was found in Yonyou UFIDA ERP-NC 5.0. It has been classified as problematic. Affected is an unknown function of the file /help/systop.jsp. The manipulation of the argument langcode leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-94 Mar 24, 2025
CVE-2025-2710 4.3 MEDIUM NUCLEI EPSS 0.00
Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting
A vulnerability was found in Yonyou UFIDA ERP-NC 5.0 and classified as problematic. This issue affects some unknown processing of the file /menu.jsp. The manipulation of the argument flag leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-94 Mar 24, 2025
CVE-2025-2709 4.3 MEDIUM NUCLEI EPSS 0.00
Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting
A vulnerability has been found in Yonyou UFIDA ERP-NC 5.0 and classified as problematic. This vulnerability affects unknown code of the file /login.jsp. The manipulation of the argument key/redirect leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-94 Mar 24, 2025
CVE-2025-2748 6.1 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.00
Kentico Xperience CMS - Unauthenticated Stored XSS
The Kentico Xperience application does not fully validate or filter files uploaded via the multiple-file upload functionality, which allows for stored XSS.This issue affects Kentico Xperience through 13.0.178.
CWE-434 Mar 24, 2025
CVE-2025-2747 9.8 CRITICAL KEV 1 Writeup NUCLEI EPSS 0.89
Kentico Xperience 13 CMS - Staging Service Authentication Bypass (WT-2025-0006)
An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server component password handling for the server defined None type. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.178.
CWE-288 Mar 24, 2025
CVE-2025-2746 9.8 CRITICAL KEV 1 Writeup NUCLEI EPSS 0.84
Kentico Xperience 13 CMS - Staging Service Authentication Bypass (WT-2025-0011)
An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server password handling of empty SHA1 usernames in digest authentication. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.172.
CWE-288 Mar 24, 2025
CVE-2025-30208 5.3 MEDIUM EXPLOITED 34 PoCs Analysis NUCLEI EPSS 0.89
Vite - Arbitrary File Read
Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.
CWE-284 Mar 24, 2025
CVE-2025-2610 7.6 HIGH EXPLOITED NUCLEI EPSS 0.02
MagnusBilling Alarm Module - Cross-Site Scripting
Improper neutralization of input during web page generation vulnerability in MagnusSolution MagnusBilling (Alarm Module modules) allows authenticated stored cross-site scripting. This vulnerability is associated with program files protected/components/MagnusLog.Php. This issue affects MagnusBilling: through 7.3.0.
CWE-79 Mar 21, 2025
CVE-2025-2609 8.2 HIGH EXPLOITED NUCLEI EPSS 0.06
MagnusBilling Login Logs - Cross-Site Scripting
Improper neutralization of input during web page generation vulnerability in MagnusSolution MagnusBilling login logging allows unauthenticated users to store HTML content in the viewable log component accessible at /mbilling/index.php/logUsers/read" cross-site scripting This vulnerability is associated with program files protected/components/MagnusLog.Php. This issue affects MagnusBilling: through 7.3.0.
CWE-79 Mar 21, 2025
CVE-2025-29927 9.1 CRITICAL EXPLOITED 138 PoCs Analysis NUCLEI EPSS 0.93
Next.js Middleware Bypass
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
CWE-285 Mar 21, 2025