Skip to main content
Mallory

Nuclei Templates Added for Exposed WordPress JetBackup and FastDup Directories

detection-content-updateinternet-exposed-serviceinternet-facing-service-vulnerabilityleaked-secret-api-key
Updated April 9, 2026 at 06:04 AM2 sources
Share:
Nuclei Templates Added for Exposed WordPress JetBackup and FastDup Directories

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

ProjectDiscovery received pull requests adding new Nuclei detection templates for CVE-2023-7165 and CVE-2023-6592, both covering information disclosure flaws in WordPress components that expose sensitive directories over HTTP. The CVE-2023-7165 template identified publicly accessible JetBackup files under /wp-content/uploads/jetbackup/, where directory listing was enabled and backup artifacts included a SQL database dump and wp-config.php. Validation output showed successful detection on a live target returning 200 OK, highlighting the risk of attackers retrieving full site backups and configuration data.

A second template for CVE-2023-6592 targeted the FastDup plugin, detecting an exposed logs directory at /wp-content/plugins/fastdup/logs/ with directory indexing enabled and a visible fastdup_log.txt file. The contributor reported testing against both vulnerable and patched setups to limit false positives, while ProjectDiscovery’s automated review found no security issues in either template itself, though it flagged metadata inconsistencies in the FastDup submission such as mismatched search dorks and an inaccurate request count.

Timeline

  1. Apr 9, 2026

    CVE-2023-7165 exposed JetBackup directory is validated with a Nuclei template

    A Nuclei template for CVE-2023-7165 was created and validated against a WordPress site exposing /wp-content/uploads/jetbackup/ with directory listing enabled. The accessible backup directory contained sensitive artifacts including a SQL dump and wp-config.php, demonstrating high-severity information disclosure.

  2. Apr 9, 2026

    CVE-2023-6592 exposed FastDup logs directory is validated with a Nuclei template

    A Nuclei template for CVE-2023-6592 was created and validated against a WordPress FastDup plugin exposure where /wp-content/plugins/fastdup/logs/ returned HTTP 200 with directory listing enabled and a visible fastdup_log.txt file. The contributor said the template was tested against both vulnerable and patched configurations to reduce false positives.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

ProjectDiscovery Adds Nuclei Checks for WordPress, Synway, and XSS Flaws

ProjectDiscovery Adds Nuclei Checks for WordPress, Synway, and XSS Flaws

ProjectDiscovery's `nuclei-templates` repository received several pull requests adding or refining detection logic for newly disclosed web vulnerabilities. Proposed templates covered **CVE-2026-0561** for cross-site scripting, **CVE-2025-69411** for a high-severity path traversal/local file read in the WordPress plugin `ioncube-tester-plus`, **CVE-2026-1405** for a critical SSRF issue in a WordPress REST API endpoint, and an unauthenticated remote command execution flaw in **Synway SMG Gateway** via `9-2radius.php`. The submissions generally reported validation against vulnerable and patched targets to reduce false positives, with several marked ready for merge pending maintainer review. The WordPress `ioncube-tester-plus` template demonstrated file disclosure through `loader-wizard.php` by abusing the `ininame` parameter to retrieve `/etc/passwd`, while the `slider-future` WordPress template showed SSRF by sending an external `image_url` to `/wp-json/slider-future/v1/upload-image/` and confirming outbound DNS interaction through OAST. The Synway SMG Gateway submission described command injection through the `radius_address` parameter reaching a `system()` call, but automated review flagged template quality problems including weak matching logic and missing metadata. Separately, a fix was proposed for the **CVE-2025-71243** template after reports of frequent false positives, replacing reflection-based checks with `md5`-based proof of code execution to improve accuracy.

3 weeks ago
Nuclei Templates Added for WordPress SSTI and Nginx UI Access Control Flaws

Nuclei Templates Added for WordPress SSTI and Nginx UI Access Control Flaws

ProjectDiscovery contributors opened and advanced Nuclei template pull requests for two newly tracked vulnerabilities: **`CVE-2026-4257`**, a **server-side template injection** issue in the **WordPress Contact Form by Supsystic** plugin, and **`CVE-2026-33032`**, a **broken access control** flaw in **Nginx UI**. The GitHub activity shows template development intended to support detection of both issues, with one pull request referencing a new `CVE-2026-4257.yaml` file and another marked ready to merge for the Nginx UI vulnerability. The available records are limited to repository metadata and do not include technical write-ups, affected version ranges, exploitation details, or vendor remediation guidance. Even so, the publication of detection content for these CVEs indicates that security researchers are operationalizing checks for exposed systems, and defenders using Nuclei should watch for template releases covering both the WordPress plugin SSTI and the Nginx UI authorization weakness.

3 weeks ago
Nuclei Templates Added for CWP Control Web Panel and Letta AI RCE Flaws

Nuclei Templates Added for CWP Control Web Panel and Letta AI RCE Flaws

ProjectDiscovery's `nuclei-templates` repository added detection content for two remote code execution vulnerabilities: **CVE-2025-48703** affecting **CWP Control Web Panel** and **CVE-2025-51482** affecting **Letta AI**. One pull request identifies the CWP issue as an RCE flaw, while a second names an RCE path in Letta AI via the `/v1/tools/run` endpoint. The references indicate public detection coverage is being created for both issues, which can increase defender visibility as well as attacker awareness. The available material does not include affected versions, exploitation evidence, patch guidance, or victim impact, but it does confirm that both vulnerabilities were significant enough to warrant dedicated `nuclei` checks for internet-exposed systems.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.