Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.
References
Link | Resource |
---|---|
https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce | Exploit Third Party Advisory |
https://kevintel.com/CVE-2025-48828 | Third Party Advisory |
https://blog.kevintel.com/vbulletin-replaceadtemplate-kev/ | Broken Link |
Configurations
History
25 Jun 2025, 16:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vbulletin:vbulletin:6.0.3:*:*:*:*:*:*:* | |
First Time |
Vbulletin
Vbulletin vbulletin |
|
References | () https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce - Exploit, Third Party Advisory | |
References | () https://kevintel.com/CVE-2025-48828 - Third Party Advisory | |
References | () https://blog.kevintel.com/vbulletin-replaceadtemplate-kev/ - Broken Link |
27 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 May 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
|
Summary | (en) Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025. |
27 May 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-27 04:15
Updated : 2025-06-25 16:32
NVD link : CVE-2025-48828
Mitre link : CVE-2025-48828
CVE.ORG link : CVE-2025-48828
JSON object : View
Products Affected
vbulletin
- vbulletin
CWE
CWE-424
Improper Protection of Alternate Path