Skip to content

Commit

Permalink
Regenerated cve-less templates. Closes #21
Browse files Browse the repository at this point in the history
  • Loading branch information
topscoder committed May 13, 2024
1 parent e400630 commit a86e347
Show file tree
Hide file tree
Showing 17,887 changed files with 1,037,396 additions and 8 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
16 changes: 8 additions & 8 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

# Nuclei + Wordfence = ♥

This project provides a massive up-to-date collection of **<!-- START: __TOTAL_NUM_TEMPLATES -->13,265<!-- END: __TOTAL_NUM_TEMPLATES --> Nuclei templates** that can be used to scan for vulnerabilities in WordPress Core, WordPress Plugins and WordPress Themes. The templates are based on the vulnerability reports of [Wordfence.com](https://www.wordfence.com/threat-intel/vulnerabilities/).
This project provides a massive up-to-date collection of **<!-- START: __TOTAL_NUM_TEMPLATES -->31,519<!-- END: __TOTAL_NUM_TEMPLATES --> Nuclei templates** that can be used to scan for vulnerabilities in WordPress Core, WordPress Plugins and WordPress Themes. The templates are based on the vulnerability reports of [Wordfence.com](https://www.wordfence.com/threat-intel/vulnerabilities/).

This project is a valuable resource for anyone who wants to scan for vulnerabilities in WordPress-based websites. The templates are easy to use and up-to-date, and they are open source so you can modify them to fit your specific needs. If you are responsible for the security of a website that uses WordPress, I highly recommend using this project to scan for vulnerabilities.

Expand All @@ -25,19 +25,19 @@ This project is a valuable resource for anyone who wants to scan for vulnerabili
<!-- START: __STATISTICS_TABLE -->
| category | total |
|---|---|
| wp-plugins | [12,567](https://github.com/search?q=%22wp-plugin%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| wp-themes | [357](https://github.com/search?q=%22wp-theme%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| wp-core | [332](https://github.com/search?q=%22wp-core%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| wp-plugins | [29,463](https://github.com/search?q=%22wp-plugin%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| wp-themes | [1,347](https://github.com/search?q=%22wp-theme%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| wp-core | [702](https://github.com/search?q=%22wp-core%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| other | [16](https://github.com/search?q=repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML++NOT+%22wp-plugin%22+NOT+%22wp-core%22+NOT+%22wp-theme%22+path%3A%2F%5Enuclei-templates%5C%2F%2F&type=code&ref=advsearch) |


| severity | total |
|---|---|
| info | [7](https://github.com/search?q=%22severity%3A+info%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| low | [71](https://github.com/search?q=severity%3A+low+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| medium | [9,554](https://github.com/search?q=severity%3A+medium+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| high | [2,623](https://github.com/search?q=severity%3A+high+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| critical | [1,009](https://github.com/search?q=severity%3A+critical+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| low | [2,972](https://github.com/search?q=severity%3A+low+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| medium | [17,793](https://github.com/search?q=severity%3A+medium+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| high | [8,254](https://github.com/search?q=severity%3A+high+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
| critical | [2,492](https://github.com/search?q=severity%3A+critical+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) |
<!-- END: __STATISTICS_TABLE -->

## Usage
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
id: 001-prime-strategy-translate-accelerator-5be710df65d6bc92f524c90909df2f99

info:
name: >
001 Prime Strategy Translate Accelerator <= 1.1.1 - Missing Authorization
author: topscoder
severity: high
description: >
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/217d68dc-6133-4b7e-9d8f-bb8fc18f1c12?source=api-scan
classification:
cvss-metrics:
cvss-score:
cve-id:
metadata:
fofa-query: "wp-content/plugins/001-prime-strategy-translate-accelerator/"
google-query: inurl:"/wp-content/plugins/001-prime-strategy-translate-accelerator/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,001-prime-strategy-translate-accelerator,high

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/001-prime-strategy-translate-accelerator/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "001-prime-strategy-translate-accelerator"
part: body

- type: dsl
dsl:
- compare_versions(version, '< 1.1.1')
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
id: 0mk-shortener-17c0f8c5353b51c76be9ea996254e492

info:
name: >
0mk Shortener <= 0.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting
author: topscoder
severity: medium
description: >
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3b798c64-3434-427d-b578-5abbdac8cd0e?source=api-scan
classification:
cvss-metrics:
cvss-score:
cve-id:
metadata:
fofa-query: "wp-content/plugins/0mk-shortener/"
google-query: inurl:"/wp-content/plugins/0mk-shortener/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,0mk-shortener,medium

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/0mk-shortener/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "0mk-shortener"
part: body

- type: dsl
dsl:
- compare_versions(version, '< 0.2')
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
id: 0mk-shortener-cbd2f40afcea324b1b6628d63c264b5b

info:
name: >
0mk Shortener <= 0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting
author: topscoder
severity: medium
description: >
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/de9f3b83-4575-4566-9731-0af9107c7c30?source=api-scan
classification:
cvss-metrics:
cvss-score:
cve-id:
metadata:
fofa-query: "wp-content/plugins/0mk-shortener/"
google-query: inurl:"/wp-content/plugins/0mk-shortener/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,0mk-shortener,medium

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/0mk-shortener/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "0mk-shortener"
part: body

- type: dsl
dsl:
- compare_versions(version, '< 0.2')
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
id: 1-flash-gallery-e9ae08724abba099d4b3758d3e5c0730

info:
name: >
1 Flash Gallery <= 1.9.0 - Cross-Site Scripting
author: topscoder
severity: high
description: >
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8fea93d2-c1a5-416d-90d4-92304d8dc41f?source=api-scan
classification:
cvss-metrics:
cvss-score:
cve-id:
metadata:
fofa-query: "wp-content/plugins/1-flash-gallery/"
google-query: inurl:"/wp-content/plugins/1-flash-gallery/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,1-flash-gallery,high

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/1-flash-gallery/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "1-flash-gallery"
part: body

- type: dsl
dsl:
- compare_versions(version, '< 1.9.0')
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
id: 1-jquery-photo-gallery-slideshow-flash-205a1fbb250b5543ad54712c5ab85794

info:
name: >
ZooEffect Plugin for Video player, Photo Gallery Slideshow jQuery and audio / music / podcast – HTML5 <= 1.11 - Reflected Cross-Site Scripting
author: topscoder
severity: medium
description: >
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/7be3688d-61f5-457d-a38b-0560205b2f8d?source=api-scan
classification:
cvss-metrics:
cvss-score:
cve-id:
metadata:
fofa-query: "wp-content/plugins/1-jquery-photo-gallery-slideshow-flash/"
google-query: inurl:"/wp-content/plugins/1-jquery-photo-gallery-slideshow-flash/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,1-jquery-photo-gallery-slideshow-flash,medium

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/1-jquery-photo-gallery-slideshow-flash/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "1-jquery-photo-gallery-slideshow-flash"
part: body

- type: dsl
dsl:
- compare_versions(version, '< 1.11')
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
id: 1003-mortgage-application-5d3b862e6e4baaf71b24925f067433ca

info:
name: >
1003 Mortgage Application <= 1.75 - Authenticated (Subscriber+) Arbitrary File Download
author: topscoder
severity: low
description: >
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d5d77105-19a8-40eb-8a9c-aa519a757a8d?source=api-scan
classification:
cvss-metrics:
cvss-score:
cve-id:
metadata:
fofa-query: "wp-content/plugins/1003-mortgage-application/"
google-query: inurl:"/wp-content/plugins/1003-mortgage-application/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,1003-mortgage-application,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/1003-mortgage-application/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "1003-mortgage-application"
part: body

- type: dsl
dsl:
- compare_versions(version, '< 1.75')
Loading

0 comments on commit a86e347

Please sign in to comment.