Vulnerabilities with Nuclei Scanner Templates
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2024-48766
8.6
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.78
Netalertx < 24.10.12 - Path Traversal
NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php.
CWE-22
May 13, 2025
CVE-2024-46506
10.0
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.91
Unauthenticated RCE in NetAlertX
NetAlertX 23.01.14 through 24.x before 24.10.12 allows unauthenticated command injection via settings update because function=savesettings lacks an authentication requirement, as exploited in the wild in May 2025. This is related to settings.php and util.php.
CWE-306
May 13, 2025
CVE-2024-13322
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.22
Ads Pro Plugin - WordPress <4.88 - SQL Injection
The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to SQL Injection via the 'a_id' parameter in all versions up to, and including, 4.88 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
May 02, 2025
CVE-2024-13569
7.1
HIGH
NUCLEI
EPSS 0.00
Etoilewebdesign Front End Users < 3.2.32 - XSS
The Front End Users WordPress plugin through 3.2.32 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CWE-79
Apr 22, 2025
CVE-2024-58136
9.0
CRITICAL
KEV
1 Writeup
NUCLEI
EPSS 0.58
Yii 2 <2.0.52 - RCE
Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.
CWE-424
Apr 10, 2025
CVE-2024-56325
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.22
Apache Pinot < 1.3.0 - Authentication Bypass
Authentication Bypass Issue
If the path does not contain / and contain., authentication is not required.
Expected Normal Request and Response Example
curl -X POST -H "Content-Type: application/json" -d {\"username\":\"hack2\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"} http://{server_ip}:9000/users
Return: {"code":401,"error":"HTTP 401 Unauthorized"}
Malicious Request and Response Example
curl -X POST -H "Content-Type: application/json" -d '{\"username\":\"hack\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; .
Return: {"users":{}}
A new user gets added bypassing authentication, enabling the user to control Pinot.
CWE-288
Apr 01, 2025
CVE-2024-8859
7.5
HIGH
1 Writeup
NUCLEI
EPSS 0.27
Lfprojects Mlflow < 2.17.0rc0 - Path Traversal
A path traversal vulnerability exists in mlflow/mlflow version 2.15.1. When users configure and use the dbfs service, concatenating the URL directly into the file protocol results in an arbitrary file read vulnerability. This issue occurs because only the path part of the URL is checked, while parts such as query and parameters are not handled. The vulnerability is triggered if the user has configured the dbfs service, and during usage, the service is mounted to a local directory.
CWE-29
Mar 20, 2025
CVE-2024-8021
6.1
MEDIUM
NUCLEI
EPSS 0.03
gradio-app/gradio - Open Redirect
An open redirect vulnerability exists in the latest version of gradio-app/gradio. The vulnerability allows an attacker to redirect users to a malicious website by URL encoding. This can be exploited by sending a crafted request to the application, which results in a 302 redirect to an attacker-controlled site.
CWE-601
Mar 20, 2025
CVE-2024-6842
7.5
HIGH
1 Writeup
NUCLEI
EPSS 0.77
mintplex-labs/anything-llm <1.5.5 - Info Disclosure
In version 1.5.5 of mintplex-labs/anything-llm, the `/setup-complete` API endpoint allows unauthorized users to access sensitive system settings. The data returned by the `currentSettings` function includes sensitive information such as API keys for search engines, which can be exploited by attackers to steal these keys and cause loss of user assets.
CWE-306
Mar 20, 2025
CVE-2024-13126
4.6
MEDIUM
NUCLEI
EPSS 0.02
WordPress Plugin <3.3.07 - Path Traversal
The Download Manager WordPress plugin before 3.3.07 doesn't prevent directory listing on web servers that don't use htaccess, allowing unauthorized access of files.
CWE-552
Mar 16, 2025
CVE-2024-13853
6.1
MEDIUM
NUCLEI
EPSS 0.01
Zynit Seo Tools < 4.0.7 - XSS
The SEO Tools WordPress plugin through 4.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
CWE-79
Mar 11, 2025
CVE-2024-48248
8.6
HIGH
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Nakivo Backup & Replication Director - Absolute Path Traversal
NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).
CWE-36
Mar 04, 2025
CVE-2024-9193
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.16
Whmpress Whmcs < 6.3 - Remote File Inclusion
The WHMpress - WHMCS WordPress Integration Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 6.3-revision-0 via the whmpress_domain_search_ajax_extended_results() function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. Utilizing the /admin/services.php file, this can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
CWE-98
Feb 28, 2025
CVE-2024-8425
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.45
WooCommerce Ultimate Gift Card <2.6.0 - RCE
The WooCommerce Ultimate Gift Card plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'mwb_wgm_preview_mail' and 'mwb_wgm_woocommerce_add_cart_item_data' functions in all versions up to, and including, 2.9.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that this may have been patched on an older version than 2.9.2, however, we do not have access to older versions of the software to confirm when the patch was added. The only patched version we have confirmed is 2.9.3.
CWE-434
Feb 28, 2025
CVE-2024-13634
6.1
MEDIUM
NUCLEI
EPSS 0.02
Wphobby Post Sync < 1.1 - XSS
The Post Sync WordPress plugin through 1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CWE-79
Feb 26, 2025
CVE-2024-13630
6.1
MEDIUM
NUCLEI
EPSS 0.02
Mahinsha Newsticker - XSS
The NewsTicker WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CWE-79
Feb 26, 2025
CVE-2024-13628
6.1
MEDIUM
NUCLEI
EPSS 0.02
Codecabin WP Pricing Table < 1.1 - XSS
The WP Pricing Table WordPress plugin through 1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CWE-79
Feb 26, 2025
CVE-2024-13624
7.1
HIGH
NUCLEI
EPSS 0.01
Caercam Wpmovielibrary < 2.1.4.8 - XSS
The WPMovieLibrary WordPress plugin through 2.1.4.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CWE-79
Feb 26, 2025
CVE-2024-55457
6.5
MEDIUM
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.80
MasterSAM Star Gate 11 - Path Traversal
MasterSAM Star Gate 11 is vulnerable to directory traversal via /adama/adama/downloadService. An attacker can exploit this vulnerability by manipulating the file parameter to access arbitrary files on the server, potentially exposing sensitive information.
CWE-22
Feb 20, 2025
CVE-2024-13888
7.2
HIGH
NUCLEI
EPSS 0.02
Amauri Wpmobile.app < 11.57 - Open Redirect
The WPMobile.App plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 11.56. This is due to insufficient validation on the redirect URL supplied via the 'redirect' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
CWE-601
Feb 20, 2025