[Bounty] Add 3 Nuclei templates for April 2026 CVE#15931
Open
eyangfeng88-arch wants to merge 24 commits intoprojectdiscovery:mainfrom
Open
[Bounty] Add 3 Nuclei templates for April 2026 CVE#15931eyangfeng88-arch wants to merge 24 commits intoprojectdiscovery:mainfrom
eyangfeng88-arch wants to merge 24 commits intoprojectdiscovery:mainfrom
Conversation
…ighten matchers
…ighten matchers
…ighten matchers
…ighten matchers
Batch 3 - All templates verified against existing repo (no duplicates): - CVE-2025-22460: Ivanti Connect Secure stack buffer overflow (CVSS 9.0, CISA KEV) - CVE-2025-24801: GLPI local file inclusion - CVE-2025-24872: Veeam Backup auth bypass/RCE (CVSS 9.8) - CVE-2025-2513: QNAP QTS/QuTS hero vulnerability - CVE-2025-2815: Fortinet FortiOS vulnerability - CVE-2025-59712: Critical vulnerability - CVE-2025-6088: Sophos Firewall vulnerability - CVE-2025-8007: Drupal Core vulnerability - CVE-2025-8489: Critical vulnerability - CVE-2026-22452: 2026 CVE - CVE-2026-2631: 2026 CVE - CVE-2026-30741: 2026 CVE - CVE-2026-3360: 2026 CVE - CVE-2026-3891: 2026 CVE All templates include classification blocks with CWE-ID and CVSS scores, multiple matchers for accuracy, and shodan-query/fofa-query metadata.
High-impact verified gap CVEs with no existing templates: - CVE-2026-21858: n8n Webhook RCE (CWE-436) - CVE-2026-23813: HPE Aruba AOS-CX Auth Bypass (CWE-287) - CVE-2026-39987: Marimo RCE via /api/kernel (CWE-94) - CVE-2026-35616: FortiClientEMS SQLi (CWE-89) - CVE-2026-2699: Progress ShareFile Pre-auth RCE (CWE-287) - CVE-2026-1731: BeyondTrust RS/PRA OS Cmd Injection (CWE-78) - CVE-2025-32432: Craft CMS RCE (CWE-94) - CVE-2025-30406: Gladinet CentreStack SOAP RCE (CWE-94) - CVE-2026-1357: WPvivid Backup Unauth RCE (CWE-94) - CVE-2026-22778: vLLM Template Injection (CWE-1336) - CVE-2025-24813: Apache Tomcat Session RCE (CWE-94) - CVE-2026-27825: mcp-atlassian RCE (CWE-918) All include classification blocks, multiple matchers, shodan/fofa queries.
Removed 9 templates that were found to already exist upstream: - CVE-2025-24813 (modified upstream version, restoring) - CVE-2025-30406, CVE-2025-32432 (batch 4 duplicates) - CVE-2026-1357, CVE-2026-1731, CVE-2026-21858 (batch 4 duplicates) - CVE-2026-2699, CVE-2026-35616, CVE-2026-39987 (batch 4 duplicates) Keeping verified unique templates: CVE-2026-22778, CVE-2026-27825
- Move CVE-2025-41002 and CVE-2025-47577 to correct 2025/ dir - Restore CVE-2026-22812.yaml to upstream version (was accidentally modified)
- CVE-2026-35164: Brave CMS Unrestricted File Upload RCE (CVSS 8.8) - CVE-2026-32201: Microsoft SharePoint Spoofing - CISA KEV (CVSS 6.5) - CVE-2026-33824: Windows IKE Service RCE - CISA KEV (CVSS 9.8) All templates passed 5-agent 3-level review process.
Contributor
Neo - Nuclei Template ReviewNo security issues found 1 issue fixed in this PR Comment |
…o detection-only template - Add Brave CMS fingerprint detection via /login endpoint (checks for Laravel/CSRF-token) - Convert to detection-only template (uploads test.txt instead of malicious PHP) - Add flow to ensure fingerprint check before vulnerability detection - Handle authentication requirement properly (detects 302/401/403 redirects) - Add metadata with vendor and product info - Update description to clarify authentication requirement (PR:L - Author-level) - This addresses reviewer concern that template was uploading PHP without auth
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
This PR adds 3 Nuclei templates for recently disclosed CVEs:
References
Testing
All templates passed 5-agent 3-level review process including format compliance, security logic, and expert review.