← Back to CVEs
CVE-2026-41646
MEDIUM5.5
Description
Nuclei is a vulnerability scanner built on a simple YAML-based DSL. From version 3.0.0 to before version 3.8.0, a vulnerability in Nuclei's JavaScript protocol runtime allows JavaScript templates to read local .js and .json files through the require() function, bypassing the default local file access restriction. This issue has been patched in version 3.8.0.
CVE Details
CVSS v3.1 Score5.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published5/8/2026
Last Modified5/8/2026
Sourcenvd
Honeypot Sightings0
Affected Products
projectdiscovery:nuclei
Weaknesses (CWE)
CWE-284
References
https://github.com/projectdiscovery/nuclei/commit/6f2ade6a9b427c284c15a43445f9c7f055e60e5d(security-advisories@github.com)
https://github.com/projectdiscovery/nuclei/pull/7332(security-advisories@github.com)
https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-29rg-wmcw-hpf4(security-advisories@github.com)
https://github.com/projectdiscovery/nuclei/pull/7332(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.