Researchers Uncover Nuclei Vulnerability Enabling Signature Bypass and Code Execution
Briefly

The vulnerability stems from a discrepancy between how the signature verification process and the YAML parser handle newline characters, combined with the way multiple signatures are processed.
This allows an attacker to inject malicious content into a template while maintaining a valid signature for the benign part of the template.
Since this signature verification is currently the only method available for validating Nuclei templates, it represents a potential single point of failure.
Its exploitation could allow attackers to craft malicious templates that can execute arbitrary code and access sensitive data from the host.
Read at The Hacker News
[
|
]