Summary of Releases v10.2.1 & v10.2.2
This month, we've released two new versions of Nuclei Templates, which introduce numerous improvements and new templates for Nuclei users.
Here are some highlighted stats from the combined releases:
🎉 106 new templates added
🔥 57 new CVEs covered
🛡️ 10 actively exploited KEVs included
🚀 11 first-time contributions
💰 Template Reward program launched
The Nuclei Templates v10.2.1 and v10.2.2 were released earlier this Month, introducing some useful updates for the community. These releases prioritize checks for vulnerabilities flagged as actively exploited in the wild (KEVs), as listed in CISA’s Known Exploited Vulnerabilities, enabling users to address the most urgent security risks promptly.
We’ve also rolled out Template Bounty Program💰, offering community members the opportunity to earn rewards 💸 for contributing impactful templates to the project. It’s a great way to support open-source security and earn recognition for your work.
To help you stay updated on new additions, we’ve launched a Twitter bot: @pdnuclei_bot. It provides real-time notifications for every new template added. You’ll also receive these updates in this Discord channel.
A total of 106 new templates were added in these two releases, thanks to the efforts of our community and team. These additions help users catch critical weaknesses before attackers can exploit them in the wild. This means faster response times and improved protection for your systems.
Out of the new templates added, 57 were new CVEs, ensuring you remain current with the latest security vulnerabilities.
Notably, the release includes coverage for CVE-2025-4427, a remote code execution flaw in Ivanti EPMM, which has been added to CISA’s Known Exploited Vulnerabilities (KEV) list. We’ve also added templates for CVE-2025-34026 and CVE-2025-34027, two authentication bypass issues affecting Versa Concerto, a platform widely deployed in enterprise networks. These CVE templates target vulnerabilities found in popular software products and services, helping users to identify and resolve issues before attackers can exploit them.
Templates marked with 🔥 highlight high-risk vulnerabilities with active exploitation (KEVs). ✅ Templates indicate other critical CVEs added in this release.
We’ve made several improvements in these releases to ensure templates are accurate, easy to use, and reliable during scans. This includes updating metadata, cleaning up tags, and fixing issues that could cause false positives or negatives.
vbulletin-replacead-rce.yaml
(Issue #12150)thinkphp-5022-rce.yaml
to CVE-2018-20062.yaml
(Issue #12096)s3-bucket-policy-public-access.yaml
(Issue #12085)CVE-2025-34028.yaml
(Issue #12156)CVE-2025-34026
, CVE-2025-34027
) (Issue #12138)CVE-2022-46463
template (PR #12029)We’d like to give a special thanks to all the first-time contributors for their contributions to the Nuclei Templates project :
Your contributions are greatly appreciated and help strengthen the Nuclei.
Stay in the loop with the latest Nuclei developments:
Let’s keep pushing the boundaries of open-source security together!