This script allows to find SSTI vulnerabilities with nuclei, taking advantage of this resource in its maximum analysis capacity.
In the community I have not seen SSTI Fuzzing with nuclei in general, only focused on exploitations by CVE
In the first instance they must collect the urls with the GET parameters.
cat url.txt | nuclei -t ScanSSTI.yaml
nuclei -u 'http://192.168.100.61/xvwa/vulnerabilities/ssti/?name=&submit=' -t ScanSSTI.yaml