Vulnerabilities with Nuclei Scanner Templates
Updated 6h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2023-36347
7.5
HIGH
NUCLEI
EPSS 0.84
POS Codekop v2.0 - Auth Bypass
A broken authentication mechanism in the endpoint excel.php of POS Codekop v2.0 allows unauthenticated attackers to download selling data.
CWE-306
Jun 30, 2023
CVE-2023-34599
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.49
Gibbon - XSS
Multiple Cross-Site Scripting (XSS) vulnerabilities have been identified in Gibbon v25.0.0, which enable attackers to execute arbitrary Javascript code.
CWE-79
Jun 29, 2023
CVE-2023-34598
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Gibbon - Path Traversal
Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) where it's possible to include the content of several files present in the installation folder in the server's response.
CWE-22
Jun 29, 2023
CVE-2023-2982
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.70
Miniorange Wordpress Social Login And... - Authentication Bypass
The WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 7.6.4. This is due to insufficient encryption on the user being supplied during a login validated through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the email address associated with that user. This was partially patched in version 7.6.4 and fully patched in version 7.6.5.
CWE-288
Jun 29, 2023
CVE-2023-34843
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.92
Traggo - Path Traversal
Traggo Server 0.3.0 is vulnerable to directory traversal via a crafted GET request.
CWE-22
Jun 29, 2023
CVE-2023-2624
6.1
MEDIUM
NUCLEI
EPSS 0.09
KiviCare WP <3.2.1 - XSS
The KiviCare WordPress plugin before 3.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrator
Jun 27, 2023
CVE-2023-3388
7.2
HIGH
EXPLOITED
NUCLEI
EPSS 0.67
Beautiful Cookie Consent Banner <2.10.2 - XSS
The Beautiful Cookie Consent Banner for WordPress is vulnerable to Stored Cross-Site Scripting via the 'nsc_bar_content_href' parameter in versions up to, and including, 2.10.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. A partial patch was made available in 2.10.1 and the issue was fully patched in 2.10.2.
CWE-79
Jun 24, 2023
CVE-2023-3197
9.8
CRITICAL
NUCLEI
EPSS 0.37
MStore API <4.0.1 - SQL Injection
The MStore API plugin for WordPress is vulnerable to Unauthenticated Blind SQL Injection via the 'id' parameter in versions up to, and including, 4.0.1 due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Jun 24, 2023
CVE-2023-36346
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.09
POS Codekop v2.0 - XSS
POS Codekop v2.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the nm_member parameter at print.php.
CWE-79
Jun 23, 2023
CVE-2023-35162
9.6
CRITICAL
1 Writeup
NUCLEI
EPSS 0.16
Xwiki < 14.10.5 - XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the previewactions template to perform a XSS, e.g. by using URL such as: > <hostname>/xwiki/bin/get/FlamingoThemes/Cerulean xpage=xpart&vm=previewactions.vm&xcontinue=javascript:alert(document.domain). This vulnerability exists since XWiki 6.1-rc-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
CWE-79
Jun 23, 2023
CVE-2023-35161
9.6
CRITICAL
1 Writeup
NUCLEI
EPSS 0.16
Xwiki < 14.10.5 - XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the DeleteApplication page to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 6.2-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
CWE-79
Jun 23, 2023
CVE-2023-35160
9.6
CRITICAL
1 Writeup
NUCLEI
EPSS 0.12
Xwiki < 14.10.5 - XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the resubmit template to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/XWiki/Main xpage=resubmit&resubmit=javascript:alert(document.domain)&xback=javascript:alert(document.domain). This vulnerability exists since XWiki 2.5-milestone-2. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
CWE-79
Jun 23, 2023
CVE-2023-35159
9.6
CRITICAL
1 Writeup
NUCLEI
EPSS 0.05
Xwiki < 14.10.5 - XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the deletespace template to perform a XSS, e.g. by using URL such as: > xwiki/bin/deletespace/Sandbox/?xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 3.4-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
CWE-79
Jun 23, 2023
CVE-2023-35158
9.6
CRITICAL
1 Writeup
NUCLEI
EPSS 0.11
Xwiki < 14.10.5 - XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the restore template to perform a XSS, e.g. by using URL such as: > /xwiki/bin/view/XWiki/Main?xpage=restore&showBatch=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 9.4-rc-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
CWE-87
Jun 23, 2023
CVE-2023-35156
9.6
CRITICAL
1 Writeup
NUCLEI
EPSS 0.12
Xwiki < 14.10.6 - XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the delete template to perform a XSS, e.g. by using URL such as: > xwiki/bin/get/FlamingoThemes/Cerulean?xpage=xpart&vm=delete.vm&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 6.0-rc-1. The vulnerability has been patched in XWiki 14.10.6 and 15.1. Note that a partial patch has been provided in 14.10.5 but wasn't enough to entirely fix the vulnerability.
CWE-79
Jun 23, 2023
CVE-2023-35155
8.8
HIGH
NUCLEI
EPSS 0.47
Xwiki < 14.4.8 - XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). For instance, the following URL execute an `alter` on the browser: `<xwiki-host>/xwiki/bin/view/Main/?viewer=share&send=1&target=&target=%3Cimg+src+onerror%3Dalert%28document.domain%29%3E+%3Cimg+src+onerror%3Dalert%28document.domain%29%3E+%3Crenniepak%40intigriti.me%3E&includeDocument=inline&message=I+wanted+to+share+this+page+with+you.`, where `<xwiki-host>` is the URL of your XWiki installation. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.4, and 14.4.8.
CWE-79
Jun 23, 2023
CVE-2023-36287
6.1
MEDIUM
NUCLEI
EPSS 0.20
Webkul QloApps 1.6.0 - XSS
An unauthenticated Cross-Site Scripting (XSS) vulnerability found in Webkul QloApps 1.6.0 allows an attacker to obtain a user's session cookie and then impersonate that user via POST controller parameter.
CWE-79
Jun 23, 2023
CVE-2023-36284
7.5
HIGH
NUCLEI
EPSS 0.27
Webkul QloApps <1.6.0 - SQL Injection
An unauthenticated Time-Based SQL injection found in Webkul QloApps 1.6.0 via GET parameter date_from, date_to, and id_product allows a remote attacker to bypass a web application's authentication and authorization mechanisms and retrieve the contents of an entire database.
CWE-89
Jun 23, 2023
CVE-2023-36289
6.1
MEDIUM
NUCLEI
EPSS 0.24
Webkul QloApps 1.6.0 - XSS
An unauthenticated Cross-Site Scripting (XSS) vulnerability found in Webkul QloApps 1.6.0 allows an attacker to obtain a user's session cookie and then impersonate that user via POST email_create and back parameter.
CWE-79
Jun 23, 2023
CVE-2023-30258
9.8
CRITICAL
EXPLOITED
14 PoCs
Analysis
NUCLEI
EPSS 0.93
Magnussolution Magnusbilling < 7.3.0 - Command Injection
Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.
CWE-78
Jun 23, 2023