CVE-2019-16759

CRITICAL KEV NUCLEI

vBulletin 5.x /ajax/render/widget_tabbedcontainer_tab_panel PHP remote code execution.

Title source: metasploit

Description

vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.

Exploits (16)

nomisec WORKING POC 21 stars
by jas502n · remote
https://github.com/jas502n/CVE-2019-16759
nomisec WORKING POC 20 stars
by theLSA · remote
https://github.com/theLSA/vbulletin5-rce
nomisec WORKING POC 6 stars
by 0xdims · infoleak
https://github.com/0xdims/CVE-2019-16759
nomisec WORKING POC 5 stars
by M0sterHxck · remote
https://github.com/M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit
nomisec WORKING POC 4 stars
by FarjaalAhmad · remote
https://github.com/FarjaalAhmad/CVE-2019-16759
nomisec WORKING POC 4 stars
by andripwn · remote
https://github.com/andripwn/pwn-vbulletin
nomisec SCANNER 3 stars
by r00tpgp · remote
https://github.com/r00tpgp/http-vuln-CVE-2019-16759
nomisec WORKING POC 1 stars
by nako48 · remote
https://github.com/nako48/CVE-2019-16759
nomisec SCANNER 1 stars
by ludy-dev · remote
https://github.com/ludy-dev/vBulletin_Routestring-RCE
nomisec WORKING POC 1 stars
by sunian19 · remote
https://github.com/sunian19/CVE-2019-16759
nomisec WORKING POC
by psychoxploit · poc
https://github.com/psychoxploit/vbull
nomisec WORKING POC
by polar1s7 · remote
https://github.com/polar1s7/CVE-2019-16759-bypass
nomisec WORKING POC
by fxp0-4tx · remote
https://github.com/fxp0-4tx/CVE-2019-16759
exploitdb WORKING POC
by anonymous · pythonwebappsphp
https://www.exploit-db.com/exploits/47447
exploitdb WORKING POC
by r00tpgp · rubywebappsphp
https://www.exploit-db.com/exploits/47437
metasploit WORKING POC EXCELLENT
by unknown, mekhalleh (RAMELLA Sébastien) · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/vbulletin_widgetconfig_rce.rb

Nuclei Templates (1)

vBulletin 5.0.0-5.5.4 - Remote Command Execution
CRITICALVERIFIEDby madrobot
Shodan: http.component:"vBulletin" || http.html:"powered by vbulletin" || http.component:"vbulletin" || http.title:"powered by vbulletin" || cpe:"cpe:2.3:a:vbulletin:vbulletin"
FOFA: body="powered by vbulletin" || title="powered by vbulletin"

Scores

CVSS v3 9.8
EPSS 0.9443
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2021-11-03
VulnCheck KEV 2019-10-09
InTheWild.io 2021-07-23
ENISA EUVD EUVD-2019-7294

Classification

CWE
CWE-94
Status published

Affected Products (1)

vbulletin/vbulletin < 5.5.4

Timeline

Published Sep 24, 2019
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026