CVE-2025-48828

Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vbulletin:vbulletin:6.0.3:*:*:*:*:*:*:*

History

25 Jun 2025, 16:32

Type Values Removed Values Added
CPE cpe:2.3:a:vbulletin:vbulletin:6.0.3:*:*:*:*:*:*:*
First Time Vbulletin
Vbulletin vbulletin
References () https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce - () https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce - Exploit, Third Party Advisory
References () https://kevintel.com/CVE-2025-48828 - () https://kevintel.com/CVE-2025-48828 - Third Party Advisory
References () https://blog.kevintel.com/vbulletin-replaceadtemplate-kev/ - () https://blog.kevintel.com/vbulletin-replaceadtemplate-kev/ - Broken Link

27 May 2025, 18:15

Type Values Removed Values Added
References
  • () https://blog.kevintel.com/vbulletin-replaceadtemplate-kev/ -

27 May 2025, 13:15

Type Values Removed Values Added
References
  • () https://kevintel.com/CVE-2025-48828 -
Summary
  • (es) Ciertas versiones de vBulletin podrían permitir a los atacantes ejecutar código PHP arbitrario mediante el uso indebido de condicionales de plantilla en el motor de plantillas. Al crear código de plantilla con una sintaxis alternativa de invocación de funciones PHP, como la sintaxis "var_dump"("test"), los atacantes pueden eludir las comprobaciones de seguridad y ejecutar código PHP arbitrario.
Summary (en) Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code. (en) Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.

27 May 2025, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-27 04:15

Updated : 2025-06-25 16:32


NVD link : CVE-2025-48828

Mitre link : CVE-2025-48828

CVE.ORG link : CVE-2025-48828


JSON object : View

Products Affected

vbulletin

  • vbulletin
CWE
CWE-424

Improper Protection of Alternate Path