Vulnerabilities with Nuclei Scanner Templates
Updated 22m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2023-28787
9.3
CRITICAL
NUCLEI
EPSS 0.32
ExpressTech Quiz And Survey Master <8.1.4 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ExpressTech Quiz And Survey Master.This issue affects Quiz And Survey Master: from n/a through 8.1.4.
CWE-89
Mar 26, 2024
CVE-2023-7246
5.4
MEDIUM
NUCLEI
EPSS 0.02
Bowo System Dashboard < 2.8.10 - XSS
The System Dashboard WordPress plugin before 2.8.10 does not sanitize and escape some parameters, which could allow administrators in multisite WordPress configurations to perform Cross-Site Scripting attacks
CWE-79
Mar 20, 2024
CVE-2023-49785
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
Nextchat < 2.11.2 - SSRF
NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2 and prior are vulnerable to server-side request forgery and cross-site scripting. This vulnerability enables read access to internal HTTP endpoints but also write access using HTTP POST, PUT, and other methods. Attackers can also use this vulnerability to mask their source IP by forwarding malicious traffic intended for other Internet targets through these open proxies. As of time of publication, no patch is available, but other mitigation strategies are available. Users may avoid exposing the application to the public internet or, if exposing the application to the internet, ensure it is an isolated network with no access to any other internal resources.
CWE-918
Mar 12, 2024
CVE-2023-6444
5.3
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.61
Seriously Simple Podcasting <3.0.0 - Info Disclosure
The Seriously Simple Podcasting WordPress plugin before 3.0.0 discloses the Podcast owner's email address (which by default is the admin email address) via an unauthenticated crafted request.
Mar 11, 2024
CVE-2023-47218
5.8
MEDIUM
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Qnap Qts < 5.1.5.2645 - Command Injection
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.5.2645 build 20240116 and later
QuTS hero h5.1.5.2647 build 20240118 and later
QuTScloud c5.1.5.2651 and later
CWE-78
Feb 13, 2024
CVE-2023-40355
5.4
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.17
Axigen Mobile Webmail < 10.3.3.59 - XSS
Cross Site Scripting (XSS) vulnerability in Axigen versions 10.3.3.0 before 10.3.3.59, 10.4.0 before 10.4.19, and 10.5.0 before 10.5.5, allows authenticated attackers to execute arbitrary code and obtain sensitive information via the logic for switching between the Standard and Ajax versions.
CWE-79
Feb 07, 2024
CVE-2023-46359
9.8
CRITICAL
NUCLEI
EPSS 0.93
Hardy Barth cPH2 eCharge Ladestation <1.87.0 - Command Injection
An OS command injection vulnerability in Hardy Barth cPH2 eCharge Ladestation v1.87.0 and earlier, may allow an unauthenticated remote attacker to execute arbitrary commands on the system via a specifically crafted arguments passed to the connectivity check feature.
CWE-78
Feb 06, 2024
CVE-2023-6989
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.70
Getshieldsecurity Shield Security < 18.5.10 - Path Traversal
The Shield Security – Smart Bot Blocking & Intrusion Prevention Security plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 18.5.9 via the render_action_template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
CWE-22
Feb 05, 2024
CVE-2023-6933
8.8
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Wpengine Better Search Replace < 1.4.5 - Insecure Deserialization
The Better Search Replace plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.4 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502
Feb 05, 2024
CVE-2023-6389
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.53
WordPress Toolbar <2.2.6 - Open Redirect
The WordPress Toolbar WordPress plugin through 2.2.6 redirects to any URL via the "wptbto" parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
CWE-601
Jan 29, 2024
CVE-2023-52251
8.8
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Kafka UI Unauthenticated Remote Command Execution via the Groovy Filter option.
An issue discovered in provectus kafka-ui 0.4.0 through 0.7.1 allows remote attackers to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.
CWE-94
Jan 25, 2024
CVE-2023-6697
6.1
MEDIUM
NUCLEI
EPSS 0.54
Wpgmaps WP GO Maps < 9.0.28 - XSS
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the map id parameter in all versions up to, and including, 9.0.28 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CWE-79
Jan 24, 2024
CVE-2023-47115
7.1
HIGH
1 Writeup
NUCLEI
EPSS 0.03
Humansignal Label Studio < 1.9.2 - XSS
Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have a cross-site scripting (XSS) vulnerability that could be exploited when an authenticated user uploads a crafted image file for their avatar that gets rendered as a HTML file on the website. Executing arbitrary JavaScript could result in an attacker performing malicious actions on Label Studio users if they visit the crafted avatar image. For an example, an attacker can craft a JavaScript payload that adds a new Django Super Administrator user if a Django administrator visits the image.
The file `users/functions.py` lines 18-49 show that the only verification check is that the file is an image by extracting the dimensions from the file. Label Studio serves avatar images using Django's built-in `serve` view, which is not secure for production use according to Django's documentation. The issue with the Django `serve` view is that it determines the `Content-Type` of the response by the file extension in the URL path. Therefore, an attacker can upload an image that contains malicious HTML code and name the file with a `.html` extension to be rendered as a HTML page. The only file extension validation is performed on the client-side, which can be easily bypassed.
Version 1.9.2 fixes this issue. Other remediation strategies include validating the file extension on the server side, not in client-side code; removing the use of Django's `serve` view and implement a secure controller for viewing uploaded avatar images; saving file content in the database rather than on the filesystem to mitigate against other file related vulnerabilities; and avoiding trusting user controlled inputs.
CWE-79
Jan 23, 2024
CVE-2023-6970
6.1
MEDIUM
NUCLEI
EPSS 0.16
Bootstrapped WP Recipe Maker < 9.1.0 - XSS
The WP Recipe Maker plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘Referer' header in all versions up to, and including, 9.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CWE-79
Jan 18, 2024
CVE-2023-6549
8.2
HIGH
KEV
NUCLEI
EPSS 0.77
NetScaler ADC & NetScaler Gateway - DoS
Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and Out-Of-Bounds Memory Read
CWE-119
Jan 17, 2024
CVE-2023-5914
5.4
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.70
Cloud Citrix Storefront < 1912 - XSS
Cross-site scripting (XSS)
CWE-79
Jan 17, 2024
CVE-2023-5558
6.1
MEDIUM
NUCLEI
EPSS 0.03
Thimpress Learnpress < 4.2.5.5 - XSS
The LearnPress WordPress plugin before 4.2.5.5 does not sanitise and escape user input before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CWE-79
Jan 16, 2024
CVE-2023-6623
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.88
Essential Blocks <4.4.3 - Code Injection
The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.
CWE-22
Jan 15, 2024
CVE-2023-50290
6.5
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.93
Apache Solr < 9.3.0 - Information Disclosure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr.
The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-proccess.
The Solr Metrics API is protected by the "metrics-read" permission.
Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the "metrics-read" permission.
This issue affects Apache Solr: from 9.0.0 before 9.3.0.
Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API.
CWE-200
Jan 15, 2024
CVE-2023-46805
8.2
HIGH
KEV
RANSOMWARE
13 PoCs
Analysis
NUCLEI
EPSS 0.94
Ivanti Connect Secure Unauthenticated Remote Code Execution
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
CWE-287
Jan 12, 2024