Vulnerabilities with Nuclei Scanner Templates

Updated 51m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
4,077 results Clear all
CVE-2024-10783 8.1 HIGH NUCLEI EPSS 0.03
MainWP Child <5.2 - Privilege Escalation
The MainWP Child – Securely Connects to the MainWP Dashboard to Manage Multiple Sites plugin for WordPress is vulnerable to privilege escalation due to a missing authorization checks on the register_site function in all versions up to, and including, 5.2 when a site is left in an unconfigured state. This makes it possible for unauthenticated attackers to log in as an administrator on instances where MainWP Child is not yet connected to the MainWP Dashboard. IMPORTANT: this only affects sites who have MainWP Child installed and have not yet connected to the MainWP Dashboard, and do not have the unique security ID feature enabled. Sites already connected to the MainWP Dashboard plugin and do not have the unique security ID feature enabled, are NOT affected and not required to upgrade. Please note versions up to 5.3.3 contained a patch, though a bypass was discovered and not addressed until version 5.3.4.
CWE-862 Dec 13, 2024
CVE-2024-11868 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.15
LearnPress - WordPress LMS Plugin <4.2.7.3 - Info Disclosure
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.7.3 via class-lp-rest-material-controller.php. This makes it possible for unauthenticated attackers to extract potentially sensitive paid course material.
CWE-284 Dec 10, 2024
CVE-2024-10708 4.9 MEDIUM NUCLEI EPSS 0.06
Bowo System Dashboard < 2.8.15 - Path Traversal
The System Dashboard WordPress plugin before 2.8.15 does not validate user input used in a path, which could allow high privilege users such as admin to perform path traversal attacks an read arbitrary files on the server
CWE-22 Dec 10, 2024
CVE-2024-12209 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.89
WP Umbrella: Update Backup Restore & Monitoring <= 2.17.0 - Local File Inclusion
The WP Umbrella: Update Backup Restore & Monitoring plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.17.0 via the 'filename' parameter of the 'umbrella-restore' action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-98 Dec 08, 2024
CVE-2024-10516 8.1 HIGH 1 PoC Analysis NUCLEI EPSS 0.86
Swift Performance Lite <2.3.7.1 - Local PHP File Inclusion
The Swift Performance Lite plugin for WordPress is vulnerable to Local PHP File Inclusion in all versions up to, and including, 2.3.7.1 via the 'ajaxify' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-22 Dec 06, 2024
CVE-2024-11728 7.5 HIGH 2 PoCs Analysis NUCLEI EPSS 0.60
Iqonic Kivicare < 3.6.5 - SQL Injection
The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'visit_type[service_id]' parameter of the tax_calculated_data AJAX action in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Dec 06, 2024
CVE-2024-11680 9.8 CRITICAL KEV 4 PoCs Analysis NUCLEI EPSS 0.94
ProjectSend <r1720 - Auth Bypass
ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
CWE-306 Nov 26, 2024
CVE-2024-11587 3.5 LOW EXPLOITED NUCLEI EPSS 0.01
idcCMS 1.60 - XSS
A vulnerability was found in idcCMS 1.60. It has been classified as problematic. This affects the function GetCityOptionJs of the file /inc/classProvCity.php. The manipulation of the argument idName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-94 Nov 21, 2024
CVE-2024-11320 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.93
Pandora FMS authenticated command injection leading to RCE via LDAP using default DB password
Arbitrary commands execution on the server by exploiting a command injection vulnerability in the LDAP authentication mechanism. This issue affects Pandora FMS: from 700 through <=777.4
CWE-77 Nov 21, 2024
CVE-2024-10400 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Themeum Tutor Lms < 2.7.6 - SQL Injection
The Tutor LMS plugin for WordPress is vulnerable to SQL Injection via the ‘rating_filter’ parameter in all versions up to, and including, 2.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Nov 21, 2024
CVE-2024-10486 5.3 MEDIUM NUCLEI EPSS 0.05
Google for WooCommerce <2.8.6 - Info Disclosure
The Google for WooCommerce plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 2.8.6. This is due to publicly accessible print_php_information.php file. This makes it possible for unauthenticated attackers to retrieve information about Webserver and PHP configuration, which can be used to aid other attacks.
CWE-862 Nov 18, 2024
CVE-2024-0012 9.8 CRITICAL KEV RANSOMWARE 14 PoCs Analysis NUCLEI EPSS 0.94
Paloaltonetworks Pan-os - Missing Authentication
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended  best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
CWE-306 Nov 18, 2024
CVE-2024-11303 HIGH EXPLOITED NUCLEI EPSS 0.15
Korenix JetPort <1.2 - Path Traversal
The pathname of the root directory to a Restricted Directory ('Path Traversal') vulnerability in Korenix JetPort 5601 allows Path Traversal.This issue affects JetPort 5601: through 1.2.
CWE-22 Nov 18, 2024
CVE-2024-11305 6.3 MEDIUM EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.46
Altenergy Power Control Software <20241108 - SQL Injection
A vulnerability classified as critical was found in Altenergy Power Control Software up to 20241108. This vulnerability affects the function get_status_zigbee of the file /index.php/display/status_zigbee. The manipulation of the argument date leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-74 Nov 18, 2024
CVE-2024-11238 6.5 MEDIUM EXPLOITED 1 Writeup NUCLEI EPSS 0.12
Landray Ekp < 16.0 - Path Traversal
A vulnerability, which was classified as critical, was found in Landray EKP up to 16.0. This affects the function delPreviewFile of the file /sys/ui/sys_ui_component/sysUiComponent.do?method=delPreviewFile. The manipulation of the argument directoryPath leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-22 Nov 15, 2024
CVE-2024-10924 9.8 CRITICAL EXPLOITED 25 PoCs Analysis NUCLEI EPSS 0.94
WordPress Really Simple SSL Plugin Authentication Bypass to RCE
The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).
CWE-306 Nov 15, 2024
CVE-2024-10571 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.87
Ays-pro Chartify < 2.9.6 - Remote File Inclusion
The Chartify – WordPress Chart Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.9.5 via the 'source' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-98 Nov 14, 2024
CVE-2024-10146 5.4 MEDIUM NUCLEI EPSS 0.01
Simple File List WP <6.1.13 - XSS
The Simple File List WordPress plugin before 6.1.13 does not sanitise and escape a generated URL before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against admins.
CWE-79 Nov 14, 2024
CVE-2024-10081 10.0 CRITICAL EXPLOITED NUCLEI EPSS 0.74
CodeChecker <6.24.1 - Auth Bypass
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Authentication bypass occurs when the API URL ends with Authentication. This bypass allows superuser access to all API endpoints other than Authentication. These endpoints include the ability to add, edit, and remove products, among others. All endpoints, apart from the /Authentication is affected by the vulnerability. This issue affects CodeChecker: through 6.24.1.
CWE-288 Nov 06, 2024
CVE-2024-10915 8.1 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Dlink Dns-320 Firmware - Command Injection
A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been rated as critical. Affected by this issue is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument group leads to os command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
CWE-78 Nov 06, 2024