Description
Nuclei is a vulnerability scanner built on a simple YAML-based DSL. From version 3.0.0 to before version 3.8.0, a vulnerability in Nuclei's expression evaluation engine makes it possible for a malicious target server to inject and execute supported DSL expressions. This happens when HTTP response data containing helper/function syntax gets reused by multi-step templates. If the -env-vars / -ev option is explicitly enabled, this can expose host environment variables. That option is off by default, so standard configurations are not affected by the information disclosure risk. This issue has been patched in version 3.8.0.
INFO
Published Date :
2026-05-08T03:17:19.302Z
Last Modified :
2026-05-08T03:17:19.302Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-41645 vulnerability.
| Vendors | Products |
|---|---|
| Projectdiscovery |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-41645.