Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-41282

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-20 Apr, 2026 | 07:10
Updated At-20 Apr, 2026 | 07:10
Rejected At-
Credits

ProjectDiscovery Nuclei 3 before 3.8.0 allows DSL expression injection. This affects use of -env-vars for multi-step templates against untrusted targets (not the default configuration).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:20 Apr, 2026 | 07:10
Updated At:20 Apr, 2026 | 07:10
Rejected At:
▼CVE Numbering Authority (CNA)

ProjectDiscovery Nuclei 3 before 3.8.0 allows DSL expression injection. This affects use of -env-vars for multi-step templates against untrusted targets (not the default configuration).

Affected Products
Vendor
ProjectDiscovery
Product
Nuclei
Default Status
unaffected
Versions
Affected
  • From 3.0.0 before 3.8.0 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-94CWE-94 Improper Control of Generation of Code ('Code Injection')
Type: CWE
CWE ID: CWE-94
Description: CWE-94 Improper Control of Generation of Code ('Code Injection')
Metrics
VersionBase scoreBase severityVector
3.14.0MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
Version: 3.1
Base score: 4.0
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-jm34-66cf-qpvr
N/A
https://github.com/projectdiscovery/nuclei/pull/7221
N/A
https://github.com/projectdiscovery/nuclei/pull/7321
N/A
https://github.com/projectdiscovery/nuclei/commit/d2217320162d5782ca7cb95bef9dda17063818f3
N/A
https://github.com/projectdiscovery/nuclei/commit/6c803c74d193f85f8a6d9803ce493fd302cad0eb
N/A
Hyperlink: https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-jm34-66cf-qpvr
Resource: N/A
Hyperlink: https://github.com/projectdiscovery/nuclei/pull/7221
Resource: N/A
Hyperlink: https://github.com/projectdiscovery/nuclei/pull/7321
Resource: N/A
Hyperlink: https://github.com/projectdiscovery/nuclei/commit/d2217320162d5782ca7cb95bef9dda17063818f3
Resource: N/A
Hyperlink: https://github.com/projectdiscovery/nuclei/commit/6c803c74d193f85f8a6d9803ce493fd302cad0eb
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:20 Apr, 2026 | 08:16
Updated At:20 Apr, 2026 | 08:16

ProjectDiscovery Nuclei 3 before 3.8.0 allows DSL expression injection. This affects use of -env-vars for multi-step templates against untrusted targets (not the default configuration).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.0MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 4.0
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-94Primarycve@mitre.org
CWE ID: CWE-94
Type: Primary
Source: cve@mitre.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/projectdiscovery/nuclei/commit/6c803c74d193f85f8a6d9803ce493fd302cad0ebcve@mitre.org
N/A
https://github.com/projectdiscovery/nuclei/commit/d2217320162d5782ca7cb95bef9dda17063818f3cve@mitre.org
N/A
https://github.com/projectdiscovery/nuclei/pull/7221cve@mitre.org
N/A
https://github.com/projectdiscovery/nuclei/pull/7321cve@mitre.org
N/A
https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-jm34-66cf-qpvrcve@mitre.org
N/A
Hyperlink: https://github.com/projectdiscovery/nuclei/commit/6c803c74d193f85f8a6d9803ce493fd302cad0eb
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/projectdiscovery/nuclei/commit/d2217320162d5782ca7cb95bef9dda17063818f3
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/projectdiscovery/nuclei/pull/7221
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/projectdiscovery/nuclei/pull/7321
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-jm34-66cf-qpvr
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1Records found

CVE-2021-32822
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4||MEDIUM
EPSS-0.30% / 53.30%
||
7 Day CHG~0.00%
Published-16 Aug, 2021 | 18:45
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
File disclosure in hbs

The npm hbs package is an Express view engine wrapper for Handlebars. Depending on usage, users of hbs may be vulnerable to a file disclosure vulnerability. There is currently no patch for this vulnerability. hbs mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options a file disclosure vulnerability may be triggered in downstream applications. For an example PoC see the referenced GHSL-2021-020.

Action-Not Available
Vendor-hbs_projectpillarjs
Product-hbshbs
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
Details not found