CVE-2023-25135

CRITICAL EXPLOITED NUCLEI

Vbulletin - Insecure Deserialization

Title source: rule

Description

vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.

Exploits (1)

vulncheck_xdb WORKING POC
remote
https://github.com/ambionics/vbulletin-exploits

Nuclei Templates (1)

vBulletin <= 5.6.9 - Pre-authentication Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.component:"vBulletin" || http.html:"powered by vbulletin" || http.component:"vbulletin" || http.title:"powered by vbulletin" || cpe:"cpe:2.3:a:vbulletin:vbulletin"
FOFA: body="powered by vbulletin" || title="powered by vbulletin"

Scores

CVSS v3 9.8
EPSS 0.9334
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2023-12-04

Classification

CWE
CWE-502
Status published

Affected Products (3)

vbulletin/vbulletin
vbulletin/vbulletin
vbulletin/vbulletin

Timeline

Published Feb 03, 2023
Tracked Since Feb 18, 2026