Vulnerability Description
ProjectDiscovery Nuclei 3 before 3.8.0 allows DSL expression injection. This affects use of -env-vars for multi-step templates against untrusted targets (not the default configuration).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Projectdiscovery | Nuclei | >= 3.0.0, < 3.8.0 |
Related Weaknesses (CWE)
References
- https://github.com/projectdiscovery/nuclei/commit/6c803c74d193f85f8a6d9803ce493fPatch
- https://github.com/projectdiscovery/nuclei/commit/d2217320162d5782ca7cb95bef9ddaPatch
- https://github.com/projectdiscovery/nuclei/pull/7221Issue Tracking
- https://github.com/projectdiscovery/nuclei/pull/7321Issue Tracking
- https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-jm34-66cf-qpVendor AdvisoryMitigation
- https://github.com/projectdiscovery/nuclei/pull/7221Issue Tracking
- https://github.com/projectdiscovery/nuclei/pull/7321Issue Tracking
FAQ
What is CVE-2026-41282?
CVE-2026-41282 is a vulnerability with a CVSS score of 4.0 (MEDIUM). ProjectDiscovery Nuclei 3 before 3.8.0 allows DSL expression injection. This affects use of -env-vars for multi-step templates against untrusted targets (not the default configuration).
How severe is CVE-2026-41282?
CVE-2026-41282 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41282?
Check the references section above for vendor advisories and patch information. Affected products include: Projectdiscovery Nuclei.