Vulnerabilities with Nuclei Scanner Templates

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
4,077 results Clear all
CVE-2025-2558 8.6 HIGH NUCLEI EPSS 0.11
The-wound WordPress <0.0.1 - Path Traversal
The-wound WordPress theme through 0.0.1 does not validate some parameters before using them to generate paths passed to include function/s, allowing unauthenticated users to perform LFI attacks and download arbitrary file from the server
Apr 24, 2025
CVE-2025-14437 7.5 HIGH EXPLOITED NUCLEI EPSS 0.45
Hummingbird Performance <3.18.0 - Info Disclosure
The Hummingbird Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.18.0 via the 'request' function. This makes it possible for unauthenticated attackers to extract sensitive data including Cloudflare API credentials.
CWE-532 Dec 18, 2025
CVE-2025-59528 10.0 CRITICAL EXPLOITED 11 PoCs Analysis NUCLEI EPSS 0.84
Flowise < 3.0.6 - Code Injection
Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation. Specifically, inside the convertToValidJSONString function, user input is directly passed to the Function() constructor, which evaluates and executes the input as JavaScript code. Since this runs with full Node.js runtime privileges, it can access dangerous modules such as child_process and fs. This issue has been patched in version 3.0.6.
CWE-94 Sep 22, 2025
CVE-2025-64500 7.3 HIGH 2 Writeups NUCLEI EPSS 0.03
Symfony <5.4.50,6.4.29,7.3.7 - Path Traversal
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Symfony's HttpFoundation component defines an object-oriented layer for the HTTP specification. Starting in version 2.0.0 and prior to version 5.4.50, 6.4.29, and 7.3.7, the `Request` class improperly interprets some `PATH_INFO` in a way that leads to representing some URLs with a path that doesn't start with a `/`. This can allow bypassing some access control rules that are built with this `/`-prefix assumption. Starting in versions 5.4.50, 6.4.29, and 7.3.7, the `Request` class now ensures that URL paths always start with a `/`.
CWE-647 Nov 12, 2025
CVE-2025-53533 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.00
Pi-hole Admin Interface <6.2.1 - XSS
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface versions 6.2.1 and earlier are vulnerable to reflected cross-site scripting (XSS) via a malformed URL path. The 404 error page includes the requested path in the class attribute of the body tag without proper sanitization or escaping. An attacker can craft a URL containing an onload attribute that will execute arbitrary JavaScript code in the browser when a victim visits the malicious link. If an attacker sends a crafted pi-hole link to a victim and the victim visits it, attacker-controlled JavaScript code is executed in the browser of the victim. This has been patched in version 6.3.
CWE-79 Oct 27, 2025
CVE-2025-50578 9.8 CRITICAL NUCLEI EPSS 0.02
LinuxServer.io heimdall 2.6.3-ls307 - Host Header Injection and Open Redirect
LinuxServer.io heimdall 2.6.3-ls307 contains a vulnerability in how it handles user-supplied HTTP headers, specifically `X-Forwarded-Host` and `Referer`. An unauthenticated remote attacker can manipulate these headers to perform Host Header Injection and Open Redirect attacks. This allows the loading of external resources from attacker-controlled domains and unintended redirection of users, potentially enabling phishing, UI redress, and session theft. The vulnerability exists due to insufficient validation and trust of untrusted input, affecting the integrity and trustworthiness of the application.
CWE-601 Jul 30, 2025
CVE-2025-54597 7.2 HIGH 1 Writeup NUCLEI EPSS 0.01
Linuxserver Heimdall Application Dashboard < 2.7.3 - XSS
LinuxServer.io Heimdall before 2.7.3 allows XSS via the q parameter.
CWE-79 Jul 27, 2025
CVE-2025-5947 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.46
Service Finder Bookings <6.0 - Privilege Escalation
The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via authentication bypass in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user's cookie value prior to logging them in through the service_finder_switch_back() function. This makes it possible for unauthenticated attackers to login as any user including admins.
CWE-639 Aug 01, 2025
CVE-2025-62126 5.3 MEDIUM NUCLEI EPSS 0.03
Varnish/Nginx Proxy Caching <1.8.4 - Info Disclosure
Insertion of Sensitive Information Into Sent Data vulnerability in Razvan Stanga Varnish/Nginx Proxy Caching vcaching allows Retrieve Embedded Sensitive Data.This issue affects Varnish/Nginx Proxy Caching: from n/a through <= 1.8.3.
CWE-201 Dec 31, 2025
CVE-2025-4576 6.1 MEDIUM NUCLEI EPSS 0.06
Liferay Digital Experience Platform < 2024.q1.15 - XSS
A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.0 through 7.4.3.133, and Liferay DXP 2025.Q1.0 through 2025.Q1.4 ,2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15, 7.4 GA through update 92 allows an remote non-authenticated attacker to inject JavaScript into the modules/apps/blogs/blogs-web/src/main/resources/META-INF/resources/blogs/entry_cover_image_caption.jsp
CWE-79 Aug 08, 2025
CVE-2025-32463 9.3 CRITICAL KEV 98 PoCs Analysis NUCLEI EPSS 0.38
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
CWE-829 Jun 30, 2025
CVE-2025-46565 5.3 MEDIUM 1 Writeup NUCLEI EPSS 0.01
Vite <6.3.4, 6.2.7, 6.1.6, 5.4.19, 4.5.14 - Info Disclosure
Vite is a frontend tooling framework for javascript. Prior to versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14, the contents of files in the project root that are denied by a file matching pattern can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. Only files that are under project root and are denied by a file matching pattern can be bypassed. `server.fs.deny` can contain patterns matching against files (by default it includes .env, .env.*, *.{crt,pem} as such patterns). These patterns were able to bypass for files under `root` by using a combination of slash and dot (/.). This issue has been patched in versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14.
CWE-22 May 01, 2025
CVE-2025-58044 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.01
Fit2cloud Jumpserver < 3.10.19 - Open Redirect
JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.19 and v4.10.5, The /core/i18n// endpoint uses the Referer header as the redirection target without proper validation, which could lead to an Open Redirect vulnerability. This vulnerability is fixed in v3.10.19 and v4.10.5.
CWE-601 Dec 01, 2025
CVE-2025-59716 5.3 MEDIUM EXPLOITED 1 Writeup NUCLEI EPSS 0.01
Owncloud Guests < 0.12.4 - Information Disclosure
ownCloud Guests before 0.12.5 allows unauthenticated user enumeration via the /apps/guests/register/{email}/{token} endpoint. Because of insufficient validation of the supplied token in showPasswordForm, the server responds differently when an e-mail address corresponds to a valid pending guest user rather than a non-existent user.
CWE-200 Nov 05, 2025
CVE-2025-54793 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.01
Astro < 5.12.7 - Open Redirect
Astro is a web framework for content-driven websites. In versions 5.2.0 through 5.12.7, there is an Open Redirect vulnerability in the trailing slash redirection logic when handling paths with double slashes. This allows an attacker to redirect users to arbitrary external domains by crafting URLs such as https://mydomain.com//malicious-site.com/. This increases the risk of phishing and other social engineering attacks. This affects sites that use on-demand rendering (SSR) with the Node or Cloudflare adapters. It does not affect static sites, or sites deployed to Netlify or Vercel. This issue is fixed in version 5.12.8. To work around this issue at the network level, block outgoing redirect responses with a Location header value that starts with `//`.
CWE-601 Aug 08, 2025
CVE-2025-71260 8.8 HIGH NUCLEI EPSS 0.32
BMC FootPrints ITSM 20.20.02 <= 20.24.01.001 VIEWSTATE Deserialization RCE
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserialization of untrusted data vulnerability in the ASP.NET servlet's VIEWSTATE handling that allows authenticated attackers to execute arbitrary code. Attackers can supply crafted serialized objects to the VIEWSTATE parameter to achieve remote code execution and fully compromise the application. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
CWE-502 Mar 19, 2026
CVE-2025-62512 5.3 MEDIUM NUCLEI EPSS 0.02
Piwigo 15.5.0 - Info Disclosure
Piwigo is an open source photo gallery application for the web. In version 15.5.0 and likely earlier 15.x releases, the password reset functionality in Piwigo allows an unauthenticated attacker to determine whether a given username or email address exists in the system. The endpoint at password.php?action=lost returns distinct messages for valid vs. invalid accounts, enabling user enumeration. As of time of publication, no known patches are available.
CWE-204 Feb 24, 2026
CVE-2025-68043 7.3 HIGH EXPLOITED NUCLEI EPSS 0.01
LottieFiles <=3.0.0 - Privilege Escalation
Missing Authorization vulnerability in LottieFiles LottieFiles lottiefiles allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LottieFiles: from n/a through <= 3.0.0.
CWE-862 Feb 20, 2026
CVE-2025-68602 4.7 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.00
Scott Paterson Accept Donations with PayPal <1.5.1 - Open Redirect
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Scott Paterson Accept Donations with PayPal & Stripe easy-paypal-donation allows Phishing.This issue affects Accept Donations with PayPal & Stripe: from n/a through <= 1.5.2.
CWE-601 Dec 24, 2025
CVE-2025-71258 4.3 MEDIUM NUCLEI EPSS 0.02
BMC FootPrints ITSM 20.20.02 <= 20.24.01.001 Blind SSRF in searchWeb
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind server-side request forgery vulnerability in the searchWeb API component that allows authenticated attackers to cause the server to initiate arbitrary outbound requests. Attackers can exploit improper URL validation to perform internal network scanning or interact with internal services, impacting system availability. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
CWE-918 Mar 19, 2026