Nuclei is a vulnerability scanner built on a simple YAML-based DSL. From version 3.0.0 to before version 3.8.0, a vulnerability in Nuclei's expression evaluation engine makes it possible for a malicious target server to inject and execute supported DSL expressions. This happens when HTTP response data containing helper/function syntax gets reused by multi-step templates. If the -env-vars / -ev option is explicitly enabled, this can expose host environment variables. That option is off by default, so standard configurations are not affected by the information disclosure risk. This issue has been patched in version 3.8.0.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jm34-66cf-qpvr | Nuclei: Environment variable disclosure via Response-Derived DSL Expressions |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 08 May 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Projectdiscovery
Projectdiscovery nuclei |
|
| Vendors & Products |
Projectdiscovery
Projectdiscovery nuclei |
Fri, 08 May 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nuclei is a vulnerability scanner built on a simple YAML-based DSL. From version 3.0.0 to before version 3.8.0, a vulnerability in Nuclei's expression evaluation engine makes it possible for a malicious target server to inject and execute supported DSL expressions. This happens when HTTP response data containing helper/function syntax gets reused by multi-step templates. If the -env-vars / -ev option is explicitly enabled, this can expose host environment variables. That option is off by default, so standard configurations are not affected by the information disclosure risk. This issue has been patched in version 3.8.0. | |
| Title | Nuclei: Environment variable disclosure via Response-Derived DSL Expressions | |
| Weaknesses | CWE-94 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T03:17:19.302Z
Reserved: 2026-04-21T23:58:43.802Z
Link: CVE-2026-41645
No data.
Status : Received
Published: 2026-05-08T04:16:18.177
Modified: 2026-05-08T04:16:18.177
Link: CVE-2026-41645
No data.
OpenCVE Enrichment
Updated: 2026-05-08T05:30:46Z
Weaknesses
Github GHSA