CVE-2024-27920

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27920
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27920.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-27920
Aliases
Published
2024-03-15T19:25:00.748Z
Modified
2025-11-20T03:22:04.146364Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N CVSS Calculator
Summary
Unsigned code template execution through workflows in projectdiscovery/nuclei
Details

projectdiscovery/nuclei is a fast and customisable vulnerability scanner based on simple YAML based DSL. A significant security oversight was identified in Nuclei v3, involving the execution of unsigned code templates through workflows. This vulnerability specifically affects users utilizing custom workflows, potentially allowing the execution of malicious code on the user's system. This advisory outlines the impacted users, provides details on the security patch, and suggests mitigation strategies. The vulnerability is addressed in Nuclei v3.2.0. Users are strongly recommended to update to this version to mitigate the security risk. Users should refrain from using custom workflows if unable to upgrade immediately. Only trusted, verified workflows should be executed.

Database specific
{
    "cwe_ids": [
        "CWE-78"
    ]
}
References

Affected packages

Git / github.com/projectdiscovery/nuclei

Affected ranges

Type
GIT
Repo
https://github.com/projectdiscovery/nuclei
Events
Database specific
{
    "versions": [
        {
            "introduced": "3.0.0"
        },
        {
            "fixed": "3.2.0"
        }
    ]
}

Affected versions

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.0.3
v3.0.4
v3.1.0
v3.1.1
v3.1.10
v3.1.2
v3.1.3
v3.1.4
v3.1.5
v3.1.6
v3.1.7
v3.1.8
v3.1.9