Skip to main content
Mallory

Nuclei templates added for MITRE Caldera RCE and exploited Ivanti buffer overflow

actively-exploited-vulnerabilitydetection-content-updategovernment-vulnerability-catalogperimeter-device-exposureproof-of-concept-release
Updated April 4, 2026 at 08:03 AM2 sources
Share:
Nuclei templates added for MITRE Caldera RCE and exploited Ivanti buffer overflow

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

ProjectDiscovery contributors submitted new Nuclei detection templates for two high-impact vulnerabilities: CVE-2025-27364, a remote code execution flaw affecting MITRE Caldera, and CVE-2025-22457, a stack-based buffer overflow affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. The Caldera submission adds a community template for identifying exposure to the RCE issue, while the Ivanti submission adds version-based detection logic tied to product web portal pages.

The Ivanti flaw was described as a CVSS 9.0 vulnerability in X-Forwarded-For header processing and was reported as actively exploited in the wild by China-nexus threat actors, with references to Mandiant, Google TAG, and inclusion in CISA's Known Exploited Vulnerabilities catalog. The proposed Ivanti template checks for versions earlier than 22.7R2.6, giving defenders a way to quickly identify potentially exposed appliances, while the Caldera template expands scanning coverage for organizations using the adversary emulation platform.

Timeline

  1. Apr 4, 2026

    Community Nuclei template proposed for CVE-2025-22457

    A community contributor opened a pull request to add a Nuclei detection template for CVE-2025-22457. The proposed template performs version-based detection for vulnerable Ivanti Connect Secure, Policy Secure, and ZTA Gateway instances.

  2. Apr 4, 2026

    Community Nuclei template proposed for CVE-2025-27364

    A community contributor opened a pull request to add a Nuclei detection template for CVE-2025-27364, described in the reference as a remote code execution issue affecting MITRE Caldera. The visible content does not provide earlier disclosure or exploitation details beyond the template submission.

  3. Apr 4, 2025

    CVE-2025-22457 added to CISA Known Exploited Vulnerabilities catalog

    CVE-2025-22457 was added to CISA’s Known Exploited Vulnerabilities catalog after being identified as actively exploited in the wild. Reporting cited Mandiant and Google TAG attributing exploitation to China-nexus threat actors.

  4. Apr 4, 2025

    Ivanti discloses CVE-2025-22457 in Connect Secure products

    Ivanti disclosed CVE-2025-22457, a stack-based buffer overflow in X-Forwarded-For header processing affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. The issue impacts versions earlier than 22.7R2.6 and carries a CVSS score of 9.0.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Nuclei Templates Added for MITRE Caldera RCE and GitLab SAML Auth Bypass

Nuclei Templates Added for MITRE Caldera RCE and GitLab SAML Auth Bypass

ProjectDiscovery contributors submitted new Nuclei detection templates for two newly tracked vulnerabilities: **`CVE-2025-27364`**, described as an **unauthenticated remote code execution** flaw in **MITRE Caldera**, and **`CVE-2025-25291`**, an **authentication bypass** issue in **`ruby-saml`** affecting **GitLab SAML SSO** deployments. The references indicate both issues were significant enough to prompt rapid addition of scanning coverage in the public `nuclei-templates` repository. Available details remain limited because the source material is drawn from GitHub pull request metadata rather than full advisories, but the vulnerability labels point to potentially high-impact exposure in identity and adversary-emulation infrastructure. Security teams using **GitLab SAML single sign-on** or **MITRE Caldera** should track vendor guidance, validate exposure to **`CVE-2025-25291`** and **`CVE-2025-27364`**, and prepare to use updated detection content as part of vulnerability assessment workflows.

1 months ago
Nuclei Templates Added for CWP Control Web Panel and Letta AI RCE Flaws

Nuclei Templates Added for CWP Control Web Panel and Letta AI RCE Flaws

ProjectDiscovery's `nuclei-templates` repository added detection content for two remote code execution vulnerabilities: **CVE-2025-48703** affecting **CWP Control Web Panel** and **CVE-2025-51482** affecting **Letta AI**. One pull request identifies the CWP issue as an RCE flaw, while a second names an RCE path in Letta AI via the `/v1/tools/run` endpoint. The references indicate public detection coverage is being created for both issues, which can increase defender visibility as well as attacker awareness. The available material does not include affected versions, exploitation evidence, patch guidance, or victim impact, but it does confirm that both vulnerabilities were significant enough to warrant dedicated `nuclei` checks for internet-exposed systems.

1 months ago
Nuclei Templates Added for CVE-2021-42392 and PhotoPrism Unauthenticated Exposure

Nuclei Templates Added for CVE-2021-42392 and PhotoPrism Unauthenticated Exposure

ProjectDiscovery contributors submitted new **Nuclei** detection content to expand coverage for two separate security issues: `CVE-2021-42392` and an unauthenticated exposure condition affecting **PhotoPrism**. Pull request **#15734**, opened by **maciejklimek**, proposes adding a template for `CVE-2021-42392`, while pull request **#15766**, opened by **pussycat0x**, adds `photoprism-unauth-exposure.yaml` to identify publicly accessible PhotoPrism instances without authentication. Both submissions were presented as defensive scanning updates in the `projectdiscovery/nuclei-templates` repository and included standard validation notes stating they were tested against vulnerable and patched targets. Repository automation requested reviewer attention, and the PhotoPrism template was marked ready to merge, while the `CVE-2021-42392` template remained open pending review; neither reference indicated an active intrusion campaign or confirmed breach tied to the detections.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.