CVE-2024-43405
NixOS vulnerability analysis and mitigation

Overview

A high-severity vulnerability (CVE-2024-43405) was discovered in Nuclei, a widely-used open-source vulnerability scanner with over 21,000 GitHub stars and 2.1 million downloads. The vulnerability affects versions from 3.0.0 to 3.3.1 and was identified in the template signature verification system. The flaw was discovered by Wiz's engineering team and was patched in version 3.3.2, released in September 2024 (Wiz Blog, GitHub Advisory).

Technical details

The vulnerability stems from a discrepancy between how the signature verification process and the YAML parser handle newline characters, specifically in the signer package. The issue arises from the mismatch between Go's regex-based signature verification, which treats \r as part of the same line, while the YAML parser interprets it as a line break. The vulnerability carries a CVSS score of 7.8 (HIGH) according to NVD, with a vector string of CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD, SecurityWeek).

Impact

The vulnerability could allow attackers to bypass the signature check and execute malicious code via custom code templates. This is particularly concerning for organizations running untrusted or community-contributed templates without proper validation or isolation. The impact extends to both CLI users executing custom code templates from unverified sources and SDK users integrating Nuclei into their platforms, especially if they permit end-users to execute custom code templates (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to Nuclei version 3.3.2 or newer, which contains the patch for this vulnerability. For users unable to upgrade immediately, it is recommended to disable running custom code templates and refrain from using custom templates. Organizations should also ensure Nuclei is run in a sandboxed or highly isolated environment to prevent potential exploitation of untrusted templates (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-0821MEDIUM6.9
  • NixOSNixOS
  • quickjs
NoNoJan 10, 2026
CVE-2025-68949MEDIUM5.3
  • NixOSNixOS
  • n8n
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026
CVE-2026-23497LOW1.3
  • NixOSNixOS
  • learning
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management