Vulnerabilities with Nuclei Scanner Templates
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2025-71259
4.3
MEDIUM
NUCLEI
EPSS 0.03
BMC FootPrints ITSM 20.20.02 <= 20.24.01.001 Blind SSRF in externalfeed/RSS
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind server-side request forgery vulnerability in the externalfeed/RSS API component that allows authenticated attackers to trigger arbitrary outbound requests from the server. Attackers can exploit insufficient validation of externally supplied resource references to interact with internal services or cause resource exhaustion impacting availability. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
CWE-918
Mar 19, 2026
CVE-2025-71257
7.3
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.08
BMC FootPrints ITSM 20.20.02 <= 20.24.01.001 Authentication Bypass
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized access to application data and modify system resources. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
CWE-306
Mar 19, 2026
CVE-2025-13920
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.01
WP Directory Kit <1.4.9 - Info Disclosure
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
CWE-200
Jan 24, 2026
CVE-2025-6984
7.5
HIGH
NUCLEI
EPSS 0.02
Pypi Langchain-community < 0.3.27 - Information Disclosure
The langchain-ai/langchain project, specifically the EverNoteLoader component, is vulnerable to XML External Entity (XXE) attacks due to insecure XML parsing. The affected version is 0.3.63. The vulnerability arises from the use of etree.iterparse() without disabling external entity references, which can lead to sensitive information disclosure. An attacker could exploit this by crafting a malicious XML payload that references local files, potentially exposing sensitive data such as /etc/passwd.
CWE-200
Sep 04, 2025
CVE-2025-64328
7.2
HIGH
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.85
Sangoma Freepbx < 17.0.3 - OS Command Injection
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to obtain remote access to the system as an asterisk user. This issue is fixed in version 17.0.3.
CWE-78
Nov 07, 2025
CVE-2025-71243
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.85
SPIP Saisies 5.4.0-5.11.0 - RCE
The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should immediately update to version 5.11.1 or later.
CWE-94
Feb 19, 2026
CVE-2025-48281
9.3
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.07
mystyleplatform <3.21.1 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mystyleplatform MyStyle Custom Product Designer mystyle-custom-product-designer allows Blind SQL Injection.This issue affects MyStyle Custom Product Designer: from n/a through <= 3.21.1.
CWE-89
Jun 09, 2025
CVE-2025-22785
9.3
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.11
ComMotion Course Booking System <6.0.5 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ComMotion Course Booking System course-booking-system allows SQL Injection.This issue affects Course Booking System: from n/a through <= 6.0.6.
CWE-89
Jan 15, 2025
CVE-2025-27506
5.4
MEDIUM
1 Writeup
NUCLEI
EPSS 0.04
NocoDB - XSS
NocoDB is software for building databases as spreadsheets. The API endpoint related to the password reset function is vulnerable to Reflected Cross-Site-Scripting. The endpoint /api/v1/db/auth/password/reset/:tokenId is vulnerable to Reflected Cross-Site-Scripting. The flaw occurs due to implementation of the client-side template engine ejs, specifically on file resetPassword.ts where the template is using the insecure function “<%-“, which is rendered by the function renderPasswordReset. This vulnerability is fixed in 0.258.0.
CWE-79
Mar 06, 2025
CVE-2025-62613
MEDIUM
1 Writeup
NUCLEI
EPSS 0.01
VDO.Ninja <28.4 - XSS
VDO.Ninja is a tool that brings remote video feeds into OBS or other studio software via WebRTC. From versions 28.0 to before 28.4, a reflected Cross-Site Scripting (XSS) vulnerability exists on examples/control.html through the room parameter, which is improperly sanitized before being rendered in the DOM. The application fails to validate and encode user input, allowing malicious scripts to be injected and executed. This issue has been patched in version 28.4.
CWE-79
Oct 22, 2025
CVE-2025-40552
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.09
Solarwinds Web Help Desk < 2026.1 - Authentication Bypass
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CWE-1390
Jan 28, 2026
CVE-2025-62780
3.5
LOW
NUCLEI
EPSS 0.00
Changedetection < 0.50.34 - XSS
changedetection.io is a free open source web page change detection tool. A Stored Cross Site Scripting is present in changedetection.io Watch update API in versions prior to 0.50.34 due to insufficient security checks. Two scenarios are possible. In the first, an attacker can insert a new watch with an arbitrary URL which really points to a web page. Once the HTML content is retrieved, the attacker updates the URL with a JavaScript payload. In the second, an attacker substitutes the URL in an existing watch with a new URL that is in reality a JavaScript payload. When the user clicks on *Preview* and then on the malicious link, the JavaScript malicious code is executed. Version 0.50.34 fixes the issue.
CWE-79
Nov 10, 2025
CVE-2025-32355
7.3
HIGH
EXPLOITED
NUCLEI
EPSS 0.02
Rocket TRUfusion Enterprise <7.10.4.0 - SSRF
Rocket TRUfusion Enterprise through 7.10.4.0 uses a reverse proxy to handle incoming connections. However, the proxy is misconfigured in a way that allows specifying absolute URLs in the HTTP request line, causing the proxy to load the given resource.
CWE-918
Feb 17, 2026
CVE-2025-40536
8.1
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.69
SolarWinds Web Help Desk unauthenticated RCE
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality.
CWE-693
Jan 28, 2026
CVE-2025-69971
9.8
CRITICAL
1 Writeup
NUCLEI
EPSS 0.05
Frangoteam Fuxa - Hard-coded Credentials
FUXA v1.2.7 contains a hard-coded credential vulnerability in server/api/jwt-helper.js. The application uses a hard-coded secret key to sign and verify JWT Tokens. This allows remote attackers to forge valid admin tokens and bypass authentication to gain full administrative access.
CWE-798
Feb 03, 2026
CVE-2025-40554
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.06
Solarwinds Web Help Desk < 2026.1 - Authentication Bypass
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
CWE-1390
Jan 28, 2026
CVE-2025-40551
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.87
Solarwinds Web Help Desk < 2026.1 - Insecure Deserialization
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.
CWE-502
Jan 28, 2026
CVE-2025-52694
10.0
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.14
Advantech Iot Edge Linux Docker < 2.0.2 - SQL Injection
Successful exploitation of the SQL injection vulnerability could allow an unauthenticated remote attacker to execute arbitrary SQL commands on the vulnerable service when it is exposed to the Internet, potentially affecting data confidentiality, integrity, and availability. Users and administrators of affected product versions are advised to update to the latest versions immediately.
CWE-89
Jan 12, 2026
CVE-2025-15503
7.3
HIGH
EXPLOITED
NUCLEI
EPSS 0.05
Sangfor Operation And Maintenance Sec... - Improper Access Control
A security flaw has been discovered in Sangfor Operation and Maintenance Management System up to 3.0.8. The impacted element is an unknown function of the file /fort/trust/version/common/common.jsp. Performing a manipulation of the argument File results in unrestricted upload. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-284
Jan 10, 2026
CVE-2025-66744
7.5
HIGH
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.06
Yonyou YonBIP <3 - Path Traversal
In Yonyou YonBIP v3 and before, the LoginWithV8 interface in the series data application service system is vulnerable to path traversal, allowing unauthorized access to sensitive information within the system
CWE-22
Jan 09, 2026