New Templates Added: 121 | CVEs Added: 61 | First-time contributions: 15
🔥 Release Highlights 🔥
- [CVE-2026-21643] Fortinet FortiClientEMS 7.4.4 - SQL Injection (@ritikchaddha) [critical] 🔥 (kev) (vKEV)
- [CVE-2026-35616] FortiClient EMS - Authentication Bypass (@ritikchaddha) [high] 🔥 (kev) (vKEV)
- [CVE-2026-39987] Marimo <= 0.20.4 - Pre-Auth Terminal WebSocket RCE (@ritikchaddha) [critical] 🔥 (vKEV)
- [CVE-2025-59528] Flowise - Remote Code Execution (@xtr0nix) [critical] 🔥 (vKEV)
- [CVE-2026-3584] WordPress Kali Forms <= 2.4.9 - Remote Code Execution (@pussycat0x) [critical] 🔥 (vKEV)
- [CVE-2026-4020] Gravity SMTP WordPress Plugin - Sensitive Information Exposure (@theamanrawat) [high] 🔥 (vKEV)
- [CVE-2026-34197] Apache ActiveMQ - Remote Code Execution (@dhiyaneshdk, @horizon3) [critical] 🔥
- [CVE-2026-34156] NocoBase - VM Sandbox Escape to Remote Code Execution (@theamanrawat) [critical] 🔥
- [CVE-2026-20079] Cisco Secure Firewall Management Center - Authentication Bypass (@theamanrawat) [critical] 🔥
- [CVE-2026-26980] Ghost CMS Content API - SQL Injection (@domwhewell-sage) [critical] 🔥
- [CVE-2026-4257] WordPress Contact Form by Supsystic - Server-Side Template Injection (@theamanrawat) [critical] 🔥
- [CVE-2026-2699] Progress ShareFile Storage Zones Controller - Authentication Bypass (@dhiyaneshdk) [critical] 🔥
- [CVE-2026-33340] LoLLMs WEBUI - Server-Side Request Forgery (@theamanrawat) [critical] 🔥
- [CVE-2025-67303] ComfyUI-Manager < 3.38 - Configuration Overwrite (@maciejklimek) [critical] 🔥
- [CVE-2024-38819] Spring Framework Path Traversal in Functional Web Frameworks (@dhiyaneshdk) [high] 🔥
What's Changed
Bug Fixes
- Moved CVE-2026-23829 template from incorrect http folder to the network folder (Issue #15633, PR #15738).
- Fixed CVE-ID mismatches in template metadata (PR #15850).
- Fixed invalid CPE formats across multiple HTTP templates (PR #15751).
- Fixed tag formatting in CVE-2023-38875, CVE-2025-11307, CVE-2023-24322, and CVE-2025-4210 templates (PRs #15897, #15898, #15899, #15900).
- Updated CVE-2023-6825 template to correct detection logic (PR #15877).
- Corrected template author attribution from PentesterTN to 0xBassia (PR #15827).
False Negatives
- Fixed false negatives in CVE-2024-8529 (LearnPress SQLi): body matchers were unreliable for blind SQLi responses and a randstr bypass was added to defeat DB query cache (Issue #15768, PR #15844).
False Positives
- Reduced extremely high false positives in credentials-disclosure template caused by over-permissive
[\w-]+value regex with no minimum length enforcement, flagging short UI strings like"ClientSecret":"Client"as credential leaks (Issue #15563, PR #15845). - Reduced false positives in the Apache ActiveMQ Artemis Console Default Login template; tightened matcher to require a valid JSON login response with expected
artemisusername (Issue #15762, PR #15861). - Resolved false positives in molgenis-default-login template triggered by JSESSIONID cookies on custom 404 pages (Issue #12603).
- Removed false positive subdomain takeover detection templates for Netlify, Shopify, Azure Azurewebsites, Cloudapp, and Trafficmanager - these services are no longer vulnerable due to enforced TXT verification, deprecation, or claimed namespace blocking (PR #15724).
- Fixed false positive webpack-config detection triggered by SPA catch-all routing (PR #15869).
- Improved CVE-2022-3254 matchers to reduce false positives on HTML error responses (PR #15840).
- Fixed false positives in CVE-2024-52762 (PR #15833).
- Fixed false positives in CVE-2025-49113 (PR #15777).
Enhancements
- Refactored matchers in CVE-2024-42009 for improved detection accuracy (PR #15835).
- Added and normalized CWE metadata across HTTP templates (PR #15804).
- Added additional EOL version entries to end-of-life detection templates (PR #15891).
- Updated CVE-2025-30208 detection coverage (PR #15784).
Templates Added
- [CVE-2026-39987] Marimo <= 0.20.4 - Pre-Auth Terminal WebSocket RCE (@ritikchaddha) [critical] 🔥 (vKEV)
- [CVE-2026-39365] Vite Dev Server - Path Traversal in Optimized Deps .map Handling (@theamanrawat) [medium] 🔥
- [CVE-2026-39364] Vite Dev Server - Directory Traversal (@ritikchaddha) [high] 🔥
- [CVE-2026-35616] FortiClient EMS - Authentication Bypass (@ritikchaddha) [high] 🔥 (kev) (vKEV)
- [CVE-2026-34885] WordPress Media Library Assistant <= 3.34 - SQL Injection (@theamanrawat) [high] 🔥
- [CVE-2026-34605] SiYuan Note - Cross-Site Scripting (@ritikchaddha) [medium]
- [CVE-2026-34453] SiYuan <= v3.6.1 - Bookmark Data Disclosure (@0x_Akoko) [high]
- [CVE-2026-34197] Apache ActiveMQ - Remote Code Execution (@dhiyaneshdk, @horizon3) [critical] 🔥
- [CVE-2026-34156] NocoBase - VM Sandbox Escape to Remote Code Execution (@theamanrawat) [critical] 🔥
- [CVE-2026-33478] AVideo <= 26.0 - WWBN AVideo - Remote Code Execution (@pussycat0x) [critical]
- [CVE-2026-33340] LoLLMs WEBUI - Server-Side Request Forgery (@theamanrawat) [critical] 🔥
- [CVE-2026-31809] SiYuan <= v3.5.9 - Cross Site Scripting (@0x_Akoko) [medium]
- [CVE-2026-31807] SiYuan <= v3.5.9 - SVG Animate Element XSS (@0x_Akoko) [medium]
- [CVE-2026-30824] Flowise - NVIDIA NIM Endpoints Missing Authentication (@dhiyaneshdk) [high] 🔥
- [CVE-2026-29183] SiYuan Note - Cross-Site Scripting (@ritikchaddha) [medium]
- [CVE-2026-29066] TinaCMS - Path Traversal (@theamanrawat) [medium]
- [CVE-2026-29014] MetInfo CMS <= 8.1 - Remote Code Execution (@0x_Akoko) [critical]
- [CVE-2026-28414] Gradio - Absolute Path Traversal (@0x_Akoko) [high] 🔥
- [CVE-2026-28358] NocoDB - User Enumeration (@dhiyaneshdk) [medium] 🔥
- [CVE-2026-26980] Ghost CMS Content API - SQL Injection (@domwhewell-sage) [critical] 🔥
- [CVE-2026-25616] Blesta <= 5.13.1 - Cross-Site Scripting (@0x_Akoko) [medium]
- [CVE-2026-21643] Fortinet FortiClientEMS 7.4.4 - SQL Injection (@ritikchaddha) [critical] 🔥 (kev) (vKEV)
- [CVE-2026-20079] Cisco Secure Firewall Management Center - Authentication Bypass (@theamanrawat) [critical] 🔥
- [CVE-2026-6203] User Registration & Membership WordPress plugin - Open Redirect (@theamanrawat) [medium] 🔥
- [CVE-2026-6118] AstrBot <= 4.22.1 - Command Injection (@jyoti369) [high]
- [CVE-2026-5615] VvvebJs <= 2.0.5 - Cross-Site Scripting (@theamanrawat) [medium]
- [CVE-2026-4257] WordPress Contact Form by Supsystic - Server-Side Template Injection (@theamanrawat) [critical] 🔥
- [CVE-2026-4106] HT Mega < 3.0.7 - Sensitive Information Disclosure (@efetr) [high] 🔥
- [CVE-2026-4020] Gravity SMTP WordPress Plugin - Sensitive Information Exposure (@theamanrawat) [high] 🔥 (vKEV)
- [CVE-2026-3584] WordPress Kali Forms <= 2.4.9 - Remote Code Execution (@pussycat0x) [critical] 🔥 (vKEV)
- [CVE-2026-3396] WCAPF WooCommerce Ajax Product Filter - SQL Injection (@theamanrawat) [high] 🔥
- [CVE-2026-2699] Progress ShareFile Storage Zones Controller - Authentication Bypass (@dhiyaneshdk) [critical] 🔥
- [CVE-2026-2416] Geo Mashup <= 1.13.17 - SQL Injection (@Shivam Kamboj) [high]
- [CVE-2025-67303] ComfyUI-Manager < 3.38 - Configuration Overwrite (@maciejklimek) [critical] 🔥
- [CVE-2025-64500] Symfony HttpFoundation - Access Control Bypass via PATH_INFO (@dhiyaneshdk) [high] 🔥
- [CVE-2025-59528] Flowise - Remote Code Execution (@xtr0nix) [critical] 🔥 (vKEV)
- [CVE-2025-55150] Stirling-PDF < 1.1.0 - Server-Side Request Forgery (@weqi) [high] 🔥
- [CVE-2025-54597] Heimdall Application Dashboard < 2.7.3 - Reflected XSS (@0x_Akoko) [medium]
- [CVE-2025-53533] Pi-hole Reflected XSS in 404-Error Page (@dhiyaneshdk) [medium] 🔥
- [CVE-2025-50578] Heimdall - Host Header Injection & Open Redirect (@dhiyaneshdk) [medium]
- [CVE-2025-32614] EventON Lite <= 2.4 - Authenticated Local File Inclusion (@pussycat0x) [high] 🔥
- [CVE-2025-14340] Payara Server - Cross-Site Scripting (@0x_Akoko, @0xr2r) [high] 🔥
- [CVE-2025-14124] Team WordPress Plugin (TLP Team) <= 5.0.9 - SQL Injection (@neosmith1, @0x_Akoko) [high] 🔥
- [CVE-2025-13652] WordPress CBX Bookmark & Favorite Plugin <= 2.0.4 - SQL Injection (@neosmith1) [critical] 🔥
- [CVE-2025-12536] SureForms <= 1.13.1 - Sensitive Information Exposure (@pussycat0x) [medium] 🔥
- [CVE-2025-5350] WSO2 - Server Side Request Forgery (@sourabh Grover) [medium] 🔥
- [CVE-2025-2558] WordPress The Wound Theme <= 0.0.1 - Local File Inclusion (@pussycat0x) [high]
- [CVE-2025-2221] WordPress WPCOM Member <= 1.7.6 - SQL Injection (@neosmith1, @0x_Akoko) [high] 🔥
- [CVE-2024-49357] ZimaOS <= v1.2.4 - Sensitive Information Disclosure (@dhiyaneshdk) [high]
- [CVE-2024-38819] Spring Framework Path Traversal in Functional Web Frameworks (@dhiyaneshdk) [high] 🔥
- [CVE-2024-28752] Apache CXF < 4.0.4 - Aegis DataBinding SSRF / Local File Read (@maciejklimek) [high] 🔥
- [CVE-2024-8252] WordPress Clean Login <= 1.14.5 Authenticated (Contributor+) - Local File Inclusion (@pussycat0x) [high] 🔥
- [CVE-2023-49293] Vite dev server - Cross-Site Scripting (@ritikchaddha) [medium] 🔥
- [CVE-2023-40924] SolarView Compact < 6.00 - Directory Traversal (@dhiyaneshdk) [high]
- [CVE-2023-7165] JetBackup <= 2.0.9.7 - Sensitive Information Exposure via Directory Listing (@pussycat0x) [high] 🔥
- [CVE-2023-6825] WordPress File Manager <= 7.2.1 - Directory Traversal (@pussycat0x) [critical] 🔥
- [CVE-2023-6750] WordPress WP Clone <= 2.4.2 - Database Backup Exposure (@pussycat0x) [critical] 🔥
- [CVE-2023-6592] WordPress FastDup <= 2.1.9 Sensitive Information Exposure - Directory Listing (@pussycat0x) [medium] 🔥
- [CVE-2022-41678] Apache ActiveMQ < 5.16.5/5.17.3 - Remote Code Execution (@maciejklimek) [high] 🔥
- [CVE-2021-46371] AntD Admin - Sensitive Information Disclosure (@ritikchaddha) [high]
- [CVE-2021-23337] Lodash Template - Server-Side Template Injection (RCE) (@dhiyaneshdk) [high] 🔥
- [apache-sling-default-login] Apache Sling - Default Login (@icarot) [high]
- [astrbot-default-login] AstrBot - Default Login (@theamanrawat) [high]
- [checkmk-default-login] Checkmk - Default Login (@0xBassia) [high]
- [freepbx-default-login] FreePBX - Default Admin Credentials (@0x_Akoko) [high]
- [graylog-default-login] Graylog - Default Login (@0x_Akoko, @0xBassia) [high]
- [grocy-default-login] Grocy - Default Admin Credentials (@0x_Akoko) [high]
- [mirth-connect-default-login] Mirth Connect - Default Admin Credentials (@0x_Akoko) [high]
- [netbox-default-login] NetBox - Default Admin Credentials (@0x_Akoko) [high]
- [owncast-default-login] Owncast - Default Credentials (@0x_Akoko) [high]
- [superset-default-login] Apache Superset - Default Login (@theamanrawat) [high]
- [activepieces-panel] Activepieces Panel - Detect (@rxerium) [info]
- [agentgpt-panel] AgentGPT Panel - Detect (@rxerium) [info]
- [anythingllm-panel] AnythingLLM Panel - Detect (@rxerium) [info]
- [astrbot-panel-detect] AstrBot WebUI Login Panel - Detect (@theamanrawat) [info]
- [clearml-panel] ClearML Panel - Detect (@rxerium) [info]
- [cvat-panel] CVAT Computer Vision Annotation Tool - Detect (@rxerium) [info]
- [devtron-panel] Devtron Panel Login Panel - Detect (@johnk3r) [info]
- [easydiffusion-panel] Easy Diffusion Panel - Detect (@rxerium) [info]
- [flowise-panel] Flowise Panel - Detect (@rxerium) [info]
- [h2o-wave-panel] H2O Wave ML Application Server - Detect (@rxerium) [info]
- [koboldai-panel] KoboldAI Panel - Detect (@rxerium) [info]
- [openclaw-control-detect] OpenClaw Control - Detect (@pbuff07) [info]
- [openhands-panel] OpenHands Panel - Detect (@rxerium) [info]
- [showdoc-panel] ShowDoc Panel Detection (@rxerium) [info]
- [sillytavern-panel] SillyTavern Panel - Detect (@rxerium) [info]
- [superagi-panel] SuperAGI Panel - Detect (@rxerium) [info]
- [devtron-env-config-js] Devtron JavaScript Environment Configuration - Exposure (@johnk3r) [low]
- [argo-workflows-unauth] Argo Workflows - Unauthenticated Dashboard (@0xBassia) [high]
- [baget-exposure] BaGet - Exposure (@dhiyaneshdk) [medium]
- [blockchain-rpc-debug-exposure] Blockchain RPC Debug Trace Methods - Exposure (@0xBassia) [medium]
- [blockchain-rpc-txpool-exposed] Blockchain RPC - txpool_content Exposed (@0xBassia) [high]
- [dbgate-anonymous-access] DbGate Anonymous Access - Detection (@benharvey-sage) [high]
- [glitchtip-public-signup] Gitea Public Registration Enabled (@dhiyaneshdk) [medium]
- [heimdall-dashboard-exposure] Heimdall Application Dashboard - Unauthenticated Access (@0x_Akoko) [medium]
- [3cx-installer] 3CX Phone System - Installer Page Exposure (@dhiyaneshdk) [high]
- [azuracast-installer] AzuraCast - Unfinished Installation (@dhiyaneshdk) [high]
- [freescout-installer] FreeScout Installer Exposure (@dhiyaneshdk) [high]
- [icinga-installer] Icinga Web 2 Installer Exposure (@pussycat0x) [high]
- [leantime-install-page-exposed] Leantime - Unfinished Installation (@0x_Akoko) [high]
- [modx-installer] ModX CMS - Unfinished Installation (@dhiyaneshdk) [high]
- [revive-adserver-installer] Revive Adserver - Exposed Installer (@dhiyaneshdk) [high]
- [node-red-unauth] Node-RED - Unauthenticated Access (@0xBassia) [high]
- [opentext-filr-guest-access] OpenText Filr - Guest Access Enabled (@pussycat0x) [medium]
- [photoprism-unauth-exposure] PhotoPrism - Unauthenticated Exposure (@pussycat0x) [high]
- [piwik-unauthenticated-access] Piwik/Matomo - Unauthenticated Access (@0x_Akoko) [high]
- [sabnzbd-unauth-access] SABnzbd - Unauthenticated Web Interface Access (@0x_Akoko) [high]
- [weak-hsts-detect] Weak HTTP Strict-Transport-Security - Detect (@saint_orion) [info]
- [apache-sling-detect] Apache Sling - Detect (@icarot) [info]
- [chromadb-detect] ChromaDB Vector Database - Detect (@rxerium) [info]
- [langflow-detect] Langflow - Detect (@rxerium) [info]
- [llamacpp-detect] llama.cpp - Detect (@rxerium) [info]
- [marqo-detect] Marqo Vector Search Engine - Detect (@rxerium) [info]
- [nicegui-detect] NiceGUI Detection (@theamanrawat) [info]
- [sdwebui-detect] Stable Diffusion WebUI - Detect (@rxerium) [info]
- [weights-biases-detect] Weights & Biases - Detect (@rxerium) [info]
- [xinference-detect] Xinference - Detect (@rxerium) [info]
- [chanjet-crm-sqli] Chanjet CRM - SQL Injection (@luckying1314@139.com) [high]
- [magento-polyshell-rce] Magento PolyShell – Unauthenticated File Upload to RCE (@slcyber, @dhiyaneshdk) [critical]
- [marimo-proxy-abuse] Marimo > 0.9.20 - Proxy Abuse (@ritikchaddha) [medium]
- [zqnb-educationcloud-exposure] ZhongQing Education Cloud Platform - Information Exposure (@ritikchaddha) [high]
New Contributors
- @maciejklimek made their first contribution in #15752
- @yaaras made their first contribution in #14654
- @Vijay-Kishore-A made their first contribution in #15778
- @0xBassia made their first contribution in #15613
- @Outs1d3r-Net made their first contribution in #15784
- @iacker made their first contribution in #15845
- @w3nq14 made their first contribution in #15723
- @9r0v3r made their first contribution in #15372
- @neosmith1 made their first contribution in #15874
- @ef3tr made their first contribution in #15883
- @0xb120 made their first contribution in #15840
- @mrperfectkarak-svg made their first contribution in #15891
- @hothersj made their first contribution in #15804
- @jyoti369 made their first contribution in #15884
- @benharvey-sage made their first contribution in #15892
Full Changelog: v10.4.1...v10.4.2