Skip to content

Commit a86e347

Browse files
committed
Regenerated cve-less templates. Closes #21
1 parent e400630 commit a86e347

File tree

17,887 files changed

+1037396
-8
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

17,887 files changed

+1037396
-8
lines changed

README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
# Nuclei + Wordfence = ♥
66

7-
This project provides a massive up-to-date collection of **<!-- START: __TOTAL_NUM_TEMPLATES -->13,265<!-- END: __TOTAL_NUM_TEMPLATES --> Nuclei templates** that can be used to scan for vulnerabilities in WordPress Core, WordPress Plugins and WordPress Themes. The templates are based on the vulnerability reports of [Wordfence.com](https://www.wordfence.com/threat-intel/vulnerabilities/).
7+
This project provides a massive up-to-date collection of **<!-- START: __TOTAL_NUM_TEMPLATES -->31,519<!-- END: __TOTAL_NUM_TEMPLATES --> Nuclei templates** that can be used to scan for vulnerabilities in WordPress Core, WordPress Plugins and WordPress Themes. The templates are based on the vulnerability reports of [Wordfence.com](https://www.wordfence.com/threat-intel/vulnerabilities/).
88

99
This project is a valuable resource for anyone who wants to scan for vulnerabilities in WordPress-based websites. The templates are easy to use and up-to-date, and they are open source so you can modify them to fit your specific needs. If you are responsible for the security of a website that uses WordPress, I highly recommend using this project to scan for vulnerabilities.
1010

@@ -25,19 +25,19 @@ This project is a valuable resource for anyone who wants to scan for vulnerabili
2525
<!-- START: __STATISTICS_TABLE -->
2626
| category | total |
2727
|---|---|
28-
| wp-plugins | [12,567](https://github.com/search?q=%22wp-plugin%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
29-
| wp-themes | [357](https://github.com/search?q=%22wp-theme%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
30-
| wp-core | [332](https://github.com/search?q=%22wp-core%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
28+
| wp-plugins | [29,463](https://github.com/search?q=%22wp-plugin%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
29+
| wp-themes | [1,347](https://github.com/search?q=%22wp-theme%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
30+
| wp-core | [702](https://github.com/search?q=%22wp-core%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
3131
| other | [16](https://github.com/search?q=repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML++NOT+%22wp-plugin%22+NOT+%22wp-core%22+NOT+%22wp-theme%22+path%3A%2F%5Enuclei-templates%5C%2F%2F&type=code&ref=advsearch) |
3232

3333

3434
| severity | total |
3535
|---|---|
3636
| info | [7](https://github.com/search?q=%22severity%3A+info%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
37-
| low | [71](https://github.com/search?q=severity%3A+low+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
38-
| medium | [9,554](https://github.com/search?q=severity%3A+medium+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
39-
| high | [2,623](https://github.com/search?q=severity%3A+high+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
40-
| critical | [1,009](https://github.com/search?q=severity%3A+critical+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
37+
| low | [2,972](https://github.com/search?q=severity%3A+low+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
38+
| medium | [17,793](https://github.com/search?q=severity%3A+medium+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
39+
| high | [8,254](https://github.com/search?q=severity%3A+high+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
40+
| critical | [2,492](https://github.com/search?q=severity%3A+critical+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
4141
<!-- END: __STATISTICS_TABLE -->
4242

4343
## Usage
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
id: 001-prime-strategy-translate-accelerator-5be710df65d6bc92f524c90909df2f99
2+
3+
info:
4+
name: >
5+
001 Prime Strategy Translate Accelerator <= 1.1.1 - Missing Authorization
6+
author: topscoder
7+
severity: high
8+
description: >
9+
10+
reference:
11+
- https://www.wordfence.com/threat-intel/vulnerabilities/id/217d68dc-6133-4b7e-9d8f-bb8fc18f1c12?source=api-scan
12+
classification:
13+
cvss-metrics:
14+
cvss-score:
15+
cve-id:
16+
metadata:
17+
fofa-query: "wp-content/plugins/001-prime-strategy-translate-accelerator/"
18+
google-query: inurl:"/wp-content/plugins/001-prime-strategy-translate-accelerator/"
19+
shodan-query: 'vuln:'
20+
tags: cve,wordpress,wp-plugin,001-prime-strategy-translate-accelerator,high
21+
22+
http:
23+
- method: GET
24+
redirects: true
25+
max-redirects: 3
26+
path:
27+
- "{{BaseURL}}/wp-content/plugins/001-prime-strategy-translate-accelerator/readme.txt"
28+
29+
extractors:
30+
- type: regex
31+
name: version
32+
part: body
33+
group: 1
34+
internal: true
35+
regex:
36+
- "(?mi)Stable tag: ([0-9.]+)"
37+
38+
- type: regex
39+
name: version
40+
part: body
41+
group: 1
42+
regex:
43+
- "(?mi)Stable tag: ([0-9.]+)"
44+
45+
matchers-condition: and
46+
matchers:
47+
- type: status
48+
status:
49+
- 200
50+
51+
- type: word
52+
words:
53+
- "001-prime-strategy-translate-accelerator"
54+
part: body
55+
56+
- type: dsl
57+
dsl:
58+
- compare_versions(version, '< 1.1.1')
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
id: 0mk-shortener-17c0f8c5353b51c76be9ea996254e492
2+
3+
info:
4+
name: >
5+
0mk Shortener <= 0.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting
6+
author: topscoder
7+
severity: medium
8+
description: >
9+
10+
reference:
11+
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3b798c64-3434-427d-b578-5abbdac8cd0e?source=api-scan
12+
classification:
13+
cvss-metrics:
14+
cvss-score:
15+
cve-id:
16+
metadata:
17+
fofa-query: "wp-content/plugins/0mk-shortener/"
18+
google-query: inurl:"/wp-content/plugins/0mk-shortener/"
19+
shodan-query: 'vuln:'
20+
tags: cve,wordpress,wp-plugin,0mk-shortener,medium
21+
22+
http:
23+
- method: GET
24+
redirects: true
25+
max-redirects: 3
26+
path:
27+
- "{{BaseURL}}/wp-content/plugins/0mk-shortener/readme.txt"
28+
29+
extractors:
30+
- type: regex
31+
name: version
32+
part: body
33+
group: 1
34+
internal: true
35+
regex:
36+
- "(?mi)Stable tag: ([0-9.]+)"
37+
38+
- type: regex
39+
name: version
40+
part: body
41+
group: 1
42+
regex:
43+
- "(?mi)Stable tag: ([0-9.]+)"
44+
45+
matchers-condition: and
46+
matchers:
47+
- type: status
48+
status:
49+
- 200
50+
51+
- type: word
52+
words:
53+
- "0mk-shortener"
54+
part: body
55+
56+
- type: dsl
57+
dsl:
58+
- compare_versions(version, '< 0.2')
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
id: 0mk-shortener-cbd2f40afcea324b1b6628d63c264b5b
2+
3+
info:
4+
name: >
5+
0mk Shortener <= 0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting
6+
author: topscoder
7+
severity: medium
8+
description: >
9+
10+
reference:
11+
- https://www.wordfence.com/threat-intel/vulnerabilities/id/de9f3b83-4575-4566-9731-0af9107c7c30?source=api-scan
12+
classification:
13+
cvss-metrics:
14+
cvss-score:
15+
cve-id:
16+
metadata:
17+
fofa-query: "wp-content/plugins/0mk-shortener/"
18+
google-query: inurl:"/wp-content/plugins/0mk-shortener/"
19+
shodan-query: 'vuln:'
20+
tags: cve,wordpress,wp-plugin,0mk-shortener,medium
21+
22+
http:
23+
- method: GET
24+
redirects: true
25+
max-redirects: 3
26+
path:
27+
- "{{BaseURL}}/wp-content/plugins/0mk-shortener/readme.txt"
28+
29+
extractors:
30+
- type: regex
31+
name: version
32+
part: body
33+
group: 1
34+
internal: true
35+
regex:
36+
- "(?mi)Stable tag: ([0-9.]+)"
37+
38+
- type: regex
39+
name: version
40+
part: body
41+
group: 1
42+
regex:
43+
- "(?mi)Stable tag: ([0-9.]+)"
44+
45+
matchers-condition: and
46+
matchers:
47+
- type: status
48+
status:
49+
- 200
50+
51+
- type: word
52+
words:
53+
- "0mk-shortener"
54+
part: body
55+
56+
- type: dsl
57+
dsl:
58+
- compare_versions(version, '< 0.2')
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
id: 1-flash-gallery-e9ae08724abba099d4b3758d3e5c0730
2+
3+
info:
4+
name: >
5+
1 Flash Gallery <= 1.9.0 - Cross-Site Scripting
6+
author: topscoder
7+
severity: high
8+
description: >
9+
10+
reference:
11+
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8fea93d2-c1a5-416d-90d4-92304d8dc41f?source=api-scan
12+
classification:
13+
cvss-metrics:
14+
cvss-score:
15+
cve-id:
16+
metadata:
17+
fofa-query: "wp-content/plugins/1-flash-gallery/"
18+
google-query: inurl:"/wp-content/plugins/1-flash-gallery/"
19+
shodan-query: 'vuln:'
20+
tags: cve,wordpress,wp-plugin,1-flash-gallery,high
21+
22+
http:
23+
- method: GET
24+
redirects: true
25+
max-redirects: 3
26+
path:
27+
- "{{BaseURL}}/wp-content/plugins/1-flash-gallery/readme.txt"
28+
29+
extractors:
30+
- type: regex
31+
name: version
32+
part: body
33+
group: 1
34+
internal: true
35+
regex:
36+
- "(?mi)Stable tag: ([0-9.]+)"
37+
38+
- type: regex
39+
name: version
40+
part: body
41+
group: 1
42+
regex:
43+
- "(?mi)Stable tag: ([0-9.]+)"
44+
45+
matchers-condition: and
46+
matchers:
47+
- type: status
48+
status:
49+
- 200
50+
51+
- type: word
52+
words:
53+
- "1-flash-gallery"
54+
part: body
55+
56+
- type: dsl
57+
dsl:
58+
- compare_versions(version, '< 1.9.0')
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
id: 1-jquery-photo-gallery-slideshow-flash-205a1fbb250b5543ad54712c5ab85794
2+
3+
info:
4+
name: >
5+
ZooEffect Plugin for Video player, Photo Gallery Slideshow jQuery and audio / music / podcast – HTML5 <= 1.11 - Reflected Cross-Site Scripting
6+
author: topscoder
7+
severity: medium
8+
description: >
9+
10+
reference:
11+
- https://www.wordfence.com/threat-intel/vulnerabilities/id/7be3688d-61f5-457d-a38b-0560205b2f8d?source=api-scan
12+
classification:
13+
cvss-metrics:
14+
cvss-score:
15+
cve-id:
16+
metadata:
17+
fofa-query: "wp-content/plugins/1-jquery-photo-gallery-slideshow-flash/"
18+
google-query: inurl:"/wp-content/plugins/1-jquery-photo-gallery-slideshow-flash/"
19+
shodan-query: 'vuln:'
20+
tags: cve,wordpress,wp-plugin,1-jquery-photo-gallery-slideshow-flash,medium
21+
22+
http:
23+
- method: GET
24+
redirects: true
25+
max-redirects: 3
26+
path:
27+
- "{{BaseURL}}/wp-content/plugins/1-jquery-photo-gallery-slideshow-flash/readme.txt"
28+
29+
extractors:
30+
- type: regex
31+
name: version
32+
part: body
33+
group: 1
34+
internal: true
35+
regex:
36+
- "(?mi)Stable tag: ([0-9.]+)"
37+
38+
- type: regex
39+
name: version
40+
part: body
41+
group: 1
42+
regex:
43+
- "(?mi)Stable tag: ([0-9.]+)"
44+
45+
matchers-condition: and
46+
matchers:
47+
- type: status
48+
status:
49+
- 200
50+
51+
- type: word
52+
words:
53+
- "1-jquery-photo-gallery-slideshow-flash"
54+
part: body
55+
56+
- type: dsl
57+
dsl:
58+
- compare_versions(version, '< 1.11')
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
id: 1003-mortgage-application-5d3b862e6e4baaf71b24925f067433ca
2+
3+
info:
4+
name: >
5+
1003 Mortgage Application <= 1.75 - Authenticated (Subscriber+) Arbitrary File Download
6+
author: topscoder
7+
severity: low
8+
description: >
9+
10+
reference:
11+
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d5d77105-19a8-40eb-8a9c-aa519a757a8d?source=api-scan
12+
classification:
13+
cvss-metrics:
14+
cvss-score:
15+
cve-id:
16+
metadata:
17+
fofa-query: "wp-content/plugins/1003-mortgage-application/"
18+
google-query: inurl:"/wp-content/plugins/1003-mortgage-application/"
19+
shodan-query: 'vuln:'
20+
tags: cve,wordpress,wp-plugin,1003-mortgage-application,low
21+
22+
http:
23+
- method: GET
24+
redirects: true
25+
max-redirects: 3
26+
path:
27+
- "{{BaseURL}}/wp-content/plugins/1003-mortgage-application/readme.txt"
28+
29+
extractors:
30+
- type: regex
31+
name: version
32+
part: body
33+
group: 1
34+
internal: true
35+
regex:
36+
- "(?mi)Stable tag: ([0-9.]+)"
37+
38+
- type: regex
39+
name: version
40+
part: body
41+
group: 1
42+
regex:
43+
- "(?mi)Stable tag: ([0-9.]+)"
44+
45+
matchers-condition: and
46+
matchers:
47+
- type: status
48+
status:
49+
- 200
50+
51+
- type: word
52+
words:
53+
- "1003-mortgage-application"
54+
part: body
55+
56+
- type: dsl
57+
dsl:
58+
- compare_versions(version, '< 1.75')

0 commit comments

Comments
 (0)