Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,534 CVEs tracked 53,639 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,342 vendors 43,887 researchers
4,077 results Clear all
CVE-2023-2732 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.90
Inspireui Mstore API < 3.9.2 - Authentication Bypass
The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.2. This is due to insufficient verification on the user being supplied during the add listing REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
CWE-288 May 25, 2023
CVE-2023-33338 9.8 CRITICAL NUCLEI EPSS 0.67
Old Age Home Management 1.0 - SQL Injection
Old Age Home Management 1.0 is vulnerable to SQL Injection via the username parameter.
CWE-89 May 23, 2023
CVE-2023-27922 6.1 MEDIUM NUCLEI EPSS 0.10
Newsletter < 7.6.9 - XSS
Cross-site scripting vulnerability in Newsletter versions prior to 7.6.9 allows a remote unauthenticated attacker to inject an arbitrary script.
CWE-79 May 23, 2023
CVE-2023-29919 9.1 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
Contec Solarview Compact Firmware - Incorrect Default Permissions
SolarView Compact <= 6.0 is vulnerable to Insecure Permissions. Any file on the server can be read or modified because texteditor.php is not restricted.
CWE-276 May 23, 2023
CVE-2023-2822 4.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.84
Ellucian Ethos Identity <5.10.5 - XSS
A vulnerability was found in Ellucian Ethos Identity up to 5.10.5. It has been classified as problematic. Affected is an unknown function of the file /cas/logout. The manipulation of the argument url leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.10.6 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-229596.
CWE-79 May 20, 2023
CVE-2023-30868 7.1 HIGH 1 PoC Analysis NUCLEI EPSS 0.41
Cms Tree Page View < 1.6.7 - XSS
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Jon Christopher CMS Tree Page View plugin <= 1.6.7 versions.
CWE-79 May 18, 2023
CVE-2023-2780 9.8 CRITICAL 1 Writeup NUCLEI EPSS 0.87
Lfprojects Mlflow < 2.3.1 - Path Traversal
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1.
CWE-29 May 17, 2023
CVE-2023-2766 5.3 MEDIUM NUCLEI EPSS 0.92
Weaver OA 9.5 - Info Disclosure
A vulnerability was found in Weaver OA 9.5 and classified as problematic. This issue affects some unknown processing of the file /building/backmgr/urlpage/mobileurl/configfile/jx2_config.ini. The manipulation leads to files or directories accessible. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-552 May 17, 2023
CVE-2023-2745 5.4 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.77
Wordpress < 4.1.38 - Path Traversal
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
CWE-22 May 17, 2023
CVE-2023-29439 7.1 HIGH 1 PoC Analysis NUCLEI EPSS 0.67
Fooplugins Foogallery < 2.2.35 - XSS
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FooPlugins FooGallery plugin <= 2.2.35 versions.
CWE-79 May 16, 2023
CVE-2023-32068 4.7 MEDIUM 1 Writeup NUCLEI EPSS 0.67
Xwiki < 14.10.4 - Open Redirect
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions prior to 14.10.4 it's possible to exploit well known parameters in XWiki URLs to perform redirection to untrusted site. This vulnerability was partially fixed in the past for XWiki 12.10.7 and 13.3RC1 but there is still the possibility to force specific URLs to skip some checks, e.g. using URLs like `http:example.com` in the parameter would allow the redirect. The issue has now been patched against all patterns that are known for performing redirects. This issue has been patched in XWiki 14.10.4 and 15.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-601 May 15, 2023
CVE-2023-32243 9.8 CRITICAL EXPLOITED 11 PoCs Analysis NUCLEI EPSS 0.94
Wpdeveloper Essential Addons For Elementor - Authentication Bypass
Improper Authentication vulnerability in WPDeveloper Essential Addons for Elementor allows Privilege Escalation. This issue affects Essential Addons for Elementor: from 5.4.0 through 5.7.1.
CWE-287 May 12, 2023
CVE-2023-30192 9.8 CRITICAL NUCLEI EPSS 0.42
Prestashop Possearchproducts - SQL Injection
Prestashop possearchproducts 1.7 is vulnerable to SQL Injection via PosSearch::find().
CWE-89 May 12, 2023
CVE-2023-30256 6.1 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.70
Webkul Qloapps - XSS
Cross Site Scripting vulnerability found in Webkil QloApps v.1.5.2 allows a remote attacker to obtain sensitive information via the back and email_create parameters in the AuthController.php file.
CWE-79 May 11, 2023
CVE-2023-2648 6.3 MEDIUM EXPLOITED 1 Writeup NUCLEI EPSS 0.93
Weaver E-Office 9.5 - Unrestricted Upload
A vulnerability was found in Weaver E-Office 9.5. It has been classified as critical. This affects an unknown part of the file /inc/jquery/uploadify/uploadify.php. The manipulation of the argument Filedata leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228777 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-434 May 11, 2023
CVE-2023-30194 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.75
Prestashop Poststaticfooter < 1.0.0 - SQL Injection
Prestashop posstaticfooter <= 1.0.0 is vulnerable to SQL Injection via posstaticfooter::getPosCurrentHook().
CWE-89 May 10, 2023
CVE-2023-30777 7.1 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.83
Advancedcustomfields Advanced Custom Fields < 6.1.6 - XSS
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WP Engine Advanced Custom Fields Pro, WP Engine Advanced Custom Fields plugins <= 6.1.5 versions.
CWE-79 May 10, 2023
CVE-2023-31478 7.5 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.83
GL.iNet <3.216 - Info Disclosure
An issue was discovered on GL.iNet devices before 3.216. An API endpoint reveals information about the Wi-Fi configuration, including the SSID and key.
May 09, 2023
CVE-2023-30019 5.3 MEDIUM NUCLEI EPSS 0.56
Evilmartians Imgproxy < 3.14.0 - SSRF
imgproxy <=3.14.0 is vulnerable to Server-Side Request Forgery (SSRF) due to a lack of sanitization of the imageURL parameter.
CWE-918 May 08, 2023
CVE-2023-30013 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.92
Totolink X5000r Firmware - OS Command Injection
TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setting/setTracerouteCfg. This vulnerability allows an attacker to execute arbitrary commands through the "command" parameter.
CWE-78 May 05, 2023