Nuclei is a vulnerability scanner built on a simple YAML-based DSL. From version 3.0.0 to before version 3.8.0, a vulnerability in Nuclei's JavaScript protocol runtime allows JavaScript templates to read local .js and .json files through the require() function, bypassing the default local file access restriction. This issue has been patched in version 3.8.0.
Metrics
Affected Vendors & Products
References
History
Fri, 08 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:projectdiscovery:nuclei:*:*:*:*:*:go:*:* |
Fri, 08 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Projectdiscovery
Projectdiscovery nuclei |
|
| Vendors & Products |
Projectdiscovery
Projectdiscovery nuclei |
Fri, 08 May 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nuclei is a vulnerability scanner built on a simple YAML-based DSL. From version 3.0.0 to before version 3.8.0, a vulnerability in Nuclei's JavaScript protocol runtime allows JavaScript templates to read local .js and .json files through the require() function, bypassing the default local file access restriction. This issue has been patched in version 3.8.0. | |
| Title | Nuclei: Local File Read via require() Module Loader Bypass | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-05-08T03:14:49.908Z
Updated: 2026-05-08T14:11:15.673Z
Reserved: 2026-04-21T23:58:43.802Z
Link: CVE-2026-41646
Updated: 2026-05-08T14:11:08.299Z
Status : Analyzed
Published: 2026-05-08T04:16:18.383
Modified: 2026-05-08T19:42:59.247
Link: CVE-2026-41646
No data.