CVE-2026-41645
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
08/05/2026
Last modified:
08/05/2026
Description
Nuclei is a vulnerability scanner built on a simple YAML-based DSL. From version 3.0.0 to before version 3.8.0, a vulnerability in Nuclei's expression evaluation engine makes it possible for a malicious target server to inject and execute supported DSL expressions. This happens when HTTP response data containing helper/function syntax gets reused by multi-step templates. If the -env-vars / -ev option is explicitly enabled, this can expose host environment variables. That option is off by default, so standard configurations are not affected by the information disclosure risk. This issue has been patched in version 3.8.0.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:projectdiscovery:nuclei:*:*:*:*:*:go:*:* | 3.0.0 (including) | 3.8.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/projectdiscovery/nuclei/commit/6c803c74d193f85f8a6d9803ce493fd302cad0eb
- https://github.com/projectdiscovery/nuclei/commit/d2217320162d5782ca7cb95bef9dda17063818f3
- https://github.com/projectdiscovery/nuclei/pull/7221
- https://github.com/projectdiscovery/nuclei/pull/7321
- https://github.com/projectdiscovery/nuclei/releases/tag/v3.8.0
- https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-jm34-66cf-qpvr



