Vulnerabilities with Nuclei Scanner Templates

Updated 22m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,077 results Clear all
CVE-2023-28787 9.3 CRITICAL NUCLEI EPSS 0.32
ExpressTech Quiz And Survey Master <8.1.4 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ExpressTech Quiz And Survey Master.This issue affects Quiz And Survey Master: from n/a through 8.1.4.
CWE-89 Mar 26, 2024
CVE-2023-7246 5.4 MEDIUM NUCLEI EPSS 0.02
Bowo System Dashboard < 2.8.10 - XSS
The System Dashboard WordPress plugin before 2.8.10 does not sanitize and escape some parameters, which could allow administrators in multisite WordPress configurations to perform Cross-Site Scripting attacks
CWE-79 Mar 20, 2024
CVE-2023-49785 9.1 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
Nextchat < 2.11.2 - SSRF
NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2 and prior are vulnerable to server-side request forgery and cross-site scripting. This vulnerability enables read access to internal HTTP endpoints but also write access using HTTP POST, PUT, and other methods. Attackers can also use this vulnerability to mask their source IP by forwarding malicious traffic intended for other Internet targets through these open proxies. As of time of publication, no patch is available, but other mitigation strategies are available. Users may avoid exposing the application to the public internet or, if exposing the application to the internet, ensure it is an isolated network with no access to any other internal resources.
CWE-918 Mar 12, 2024
CVE-2023-6444 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.61
Seriously Simple Podcasting <3.0.0 - Info Disclosure
The Seriously Simple Podcasting WordPress plugin before 3.0.0 discloses the Podcast owner's email address (which by default is the admin email address) via an unauthenticated crafted request.
Mar 11, 2024
CVE-2023-47218 5.8 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Qnap Qts < 5.1.5.2645 - Command Injection
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTScloud c5.1.5.2651 and later
CWE-78 Feb 13, 2024
CVE-2023-40355 5.4 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.17
Axigen Mobile Webmail < 10.3.3.59 - XSS
Cross Site Scripting (XSS) vulnerability in Axigen versions 10.3.3.0 before 10.3.3.59, 10.4.0 before 10.4.19, and 10.5.0 before 10.5.5, allows authenticated attackers to execute arbitrary code and obtain sensitive information via the logic for switching between the Standard and Ajax versions.
CWE-79 Feb 07, 2024
CVE-2023-46359 9.8 CRITICAL NUCLEI EPSS 0.93
Hardy Barth cPH2 eCharge Ladestation <1.87.0 - Command Injection
An OS command injection vulnerability in Hardy Barth cPH2 eCharge Ladestation v1.87.0 and earlier, may allow an unauthenticated remote attacker to execute arbitrary commands on the system via a specifically crafted arguments passed to the connectivity check feature.
CWE-78 Feb 06, 2024
CVE-2023-6989 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.70
Getshieldsecurity Shield Security < 18.5.10 - Path Traversal
The Shield Security – Smart Bot Blocking & Intrusion Prevention Security plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 18.5.9 via the render_action_template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
CWE-22 Feb 05, 2024
CVE-2023-6933 8.8 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Wpengine Better Search Replace < 1.4.5 - Insecure Deserialization
The Better Search Replace plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.4 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Feb 05, 2024
CVE-2023-6389 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.53
WordPress Toolbar <2.2.6 - Open Redirect
The WordPress Toolbar WordPress plugin through 2.2.6 redirects to any URL via the "wptbto" parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
CWE-601 Jan 29, 2024
CVE-2023-52251 8.8 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Kafka UI Unauthenticated Remote Command Execution via the Groovy Filter option.
An issue discovered in provectus kafka-ui 0.4.0 through 0.7.1 allows remote attackers to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.
CWE-94 Jan 25, 2024
CVE-2023-6697 6.1 MEDIUM NUCLEI EPSS 0.54
Wpgmaps WP GO Maps < 9.0.28 - XSS
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the map id parameter in all versions up to, and including, 9.0.28 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CWE-79 Jan 24, 2024
CVE-2023-47115 7.1 HIGH 1 Writeup NUCLEI EPSS 0.03
Humansignal Label Studio < 1.9.2 - XSS
Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have a cross-site scripting (XSS) vulnerability that could be exploited when an authenticated user uploads a crafted image file for their avatar that gets rendered as a HTML file on the website. Executing arbitrary JavaScript could result in an attacker performing malicious actions on Label Studio users if they visit the crafted avatar image. For an example, an attacker can craft a JavaScript payload that adds a new Django Super Administrator user if a Django administrator visits the image. The file `users/functions.py` lines 18-49 show that the only verification check is that the file is an image by extracting the dimensions from the file. Label Studio serves avatar images using Django's built-in `serve` view, which is not secure for production use according to Django's documentation. The issue with the Django `serve` view is that it determines the `Content-Type` of the response by the file extension in the URL path. Therefore, an attacker can upload an image that contains malicious HTML code and name the file with a `.html` extension to be rendered as a HTML page. The only file extension validation is performed on the client-side, which can be easily bypassed. Version 1.9.2 fixes this issue. Other remediation strategies include validating the file extension on the server side, not in client-side code; removing the use of Django's `serve` view and implement a secure controller for viewing uploaded avatar images; saving file content in the database rather than on the filesystem to mitigate against other file related vulnerabilities; and avoiding trusting user controlled inputs.
CWE-79 Jan 23, 2024
CVE-2023-6970 6.1 MEDIUM NUCLEI EPSS 0.16
Bootstrapped WP Recipe Maker < 9.1.0 - XSS
The WP Recipe Maker plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘Referer' header in all versions up to, and including, 9.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CWE-79 Jan 18, 2024
CVE-2023-6549 8.2 HIGH KEV NUCLEI EPSS 0.77
NetScaler ADC & NetScaler Gateway - DoS
Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and Out-Of-Bounds Memory Read
CWE-119 Jan 17, 2024
CVE-2023-5914 5.4 MEDIUM EXPLOITED NUCLEI EPSS 0.70
Cloud Citrix Storefront < 1912 - XSS
  Cross-site scripting (XSS)
CWE-79 Jan 17, 2024
CVE-2023-5558 6.1 MEDIUM NUCLEI EPSS 0.03
Thimpress Learnpress < 4.2.5.5 - XSS
The LearnPress WordPress plugin before 4.2.5.5 does not sanitise and escape user input before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CWE-79 Jan 16, 2024
CVE-2023-6623 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.88
Essential Blocks <4.4.3 - Code Injection
The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.
CWE-22 Jan 15, 2024
CVE-2023-50290 6.5 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.93
Apache Solr < 9.3.0 - Information Disclosure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr. The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-proccess. The Solr Metrics API is protected by the "metrics-read" permission. Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the "metrics-read" permission. This issue affects Apache Solr: from 9.0.0 before 9.3.0. Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API.
CWE-200 Jan 15, 2024
CVE-2023-46805 8.2 HIGH KEV RANSOMWARE 13 PoCs Analysis NUCLEI EPSS 0.94
Ivanti Connect Secure Unauthenticated Remote Code Execution
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
CWE-287 Jan 12, 2024