CVE-2019-16759
CRITICAL KEV NUCLEIvBulletin 5.x /ajax/render/widget_tabbedcontainer_tab_panel PHP remote code execution.
Title source: metasploitDescription
vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.
Exploits (16)
nomisec
WORKING POC
5 stars
by M0sterHxck · remote
https://github.com/M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit
metasploit
WORKING POC
EXCELLENT
by unknown, mekhalleh (RAMELLA Sébastien) · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/vbulletin_widgetconfig_rce.rb
Nuclei Templates (1)
vBulletin 5.0.0-5.5.4 - Remote Command Execution
CRITICALVERIFIEDby madrobot
Shodan:
http.component:"vBulletin" || http.html:"powered by vbulletin" || http.component:"vbulletin" || http.title:"powered by vbulletin" || cpe:"cpe:2.3:a:vbulletin:vbulletin"
FOFA:
body="powered by vbulletin" || title="powered by vbulletin"
References (11)
Scores
CVSS v3
9.8
EPSS
0.9443
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2021-11-03
VulnCheck KEV
2019-10-09
InTheWild.io
2021-07-23
ENISA EUVD
EUVD-2019-7294
Classification
CWE
CWE-94
Status
published
Affected Products (1)
vbulletin/vbulletin
< 5.5.4
Timeline
Published
Sep 24, 2019
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026