Skip to main content
Mallory

Nuclei Templates Added for OpenText Filr Exposure and CVE-2024-8252 Detection

detection-content-updateinternet-exposed-serviceinternet-facing-service-vulnerability
Updated April 8, 2026 at 09:03 AM2 sources
Share:
Nuclei Templates Added for OpenText Filr Exposure and CVE-2024-8252 Detection

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

ProjectDiscovery's nuclei-templates repository received two new detection-template pull requests from contributor pussycat0x: one for OpenText Filr guest access exposure and another for CVE-2024-8252. The OpenText Filr submission proposes a template named opentext-filr-guest-access.yaml aimed at identifying instances where guest access is exposed, indicating a configuration or exposure check rather than a clearly documented CVE-based issue.

A second pull request adds CVE-2024-8252.yaml, expanding Nuclei coverage for a separate vulnerability identified by CVE. In both submissions, the contributor stated the templates were validated against vulnerable and patched targets to improve detection accuracy and reduce false positives, while repository automation assigned reviewers and labels; the CVE template remained open, and automated review tooling was unable to complete analysis on at least one of the submissions during the captured review cycle.

Timeline

  1. Apr 8, 2026

    Pull request opened for CVE-2024-8252 detection template

    A contributor opened a GitHub pull request to add the Nuclei template CVE-2024-8252.yaml. The pull request indicated the template had been validated against vulnerable and patched hosts, but did not include substantive technical details about the underlying vulnerability.

  2. Apr 6, 2026

    Pull request opened for OpenText Filr guest access detection template

    A contributor opened a GitHub pull request to add the Nuclei template opentext-filr-guest-access.yaml for detecting exposed OpenText Filr guest access. The submission stated the template was validated against both vulnerable and patched configurations to reduce false positives.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Related Stories

Nuclei Templates Added for CVE-2021-42392 and PhotoPrism Unauthenticated Exposure

Nuclei Templates Added for CVE-2021-42392 and PhotoPrism Unauthenticated Exposure

ProjectDiscovery contributors submitted new **Nuclei** detection content to expand coverage for two separate security issues: `CVE-2021-42392` and an unauthenticated exposure condition affecting **PhotoPrism**. Pull request **#15734**, opened by **maciejklimek**, proposes adding a template for `CVE-2021-42392`, while pull request **#15766**, opened by **pussycat0x**, adds `photoprism-unauth-exposure.yaml` to identify publicly accessible PhotoPrism instances without authentication. Both submissions were presented as defensive scanning updates in the `projectdiscovery/nuclei-templates` repository and included standard validation notes stating they were tested against vulnerable and patched targets. Repository automation requested reviewer attention, and the PhotoPrism template was marked ready to merge, while the `CVE-2021-42392` template remained open pending review; neither reference indicated an active intrusion campaign or confirmed breach tied to the detections.

1 months ago
Nuclei Templates Added for MITRE Caldera RCE and GitLab SAML Auth Bypass

Nuclei Templates Added for MITRE Caldera RCE and GitLab SAML Auth Bypass

ProjectDiscovery contributors submitted new Nuclei detection templates for two newly tracked vulnerabilities: **`CVE-2025-27364`**, described as an **unauthenticated remote code execution** flaw in **MITRE Caldera**, and **`CVE-2025-25291`**, an **authentication bypass** issue in **`ruby-saml`** affecting **GitLab SAML SSO** deployments. The references indicate both issues were significant enough to prompt rapid addition of scanning coverage in the public `nuclei-templates` repository. Available details remain limited because the source material is drawn from GitHub pull request metadata rather than full advisories, but the vulnerability labels point to potentially high-impact exposure in identity and adversary-emulation infrastructure. Security teams using **GitLab SAML single sign-on** or **MITRE Caldera** should track vendor guidance, validate exposure to **`CVE-2025-25291`** and **`CVE-2025-27364`**, and prepare to use updated detection content as part of vulnerability assessment workflows.

1 months ago
Nuclei Templates Added for CWP Control Web Panel and Letta AI RCE Flaws

Nuclei Templates Added for CWP Control Web Panel and Letta AI RCE Flaws

ProjectDiscovery's `nuclei-templates` repository added detection content for two remote code execution vulnerabilities: **CVE-2025-48703** affecting **CWP Control Web Panel** and **CVE-2025-51482** affecting **Letta AI**. One pull request identifies the CWP issue as an RCE flaw, while a second names an RCE path in Letta AI via the `/v1/tools/run` endpoint. The references indicate public detection coverage is being created for both issues, which can increase defender visibility as well as attacker awareness. The available material does not include affected versions, exploitation evidence, patch guidance, or victim impact, but it does confirm that both vulnerabilities were significant enough to warrant dedicated `nuclei` checks for internet-exposed systems.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.