CVE-2023-25135

CRITICAL EXPLOITED NUCLEI

Vbulletin - Insecure Deserialization

Title source: rule
STIX 2.1

Description

vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.

Exploits (1)

vulncheck_xdb WORKING POC
remote
https://github.com/ambionics/vbulletin-exploits

Nuclei Templates (1)

vBulletin <= 5.6.9 - Pre-authentication Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.component:"vBulletin" || http.html:"powered by vbulletin" || http.component:"vbulletin" || http.title:"powered by vbulletin" || cpe:"cpe:2.3:a:vbulletin:vbulletin"
FOFA: body="powered by vbulletin" || title="powered by vbulletin"

Scores

CVSS v3 9.8
EPSS 0.9334
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

VulnCheck KEV 2023-12-04
CWE
CWE-502
Status published
Products (3)
vbulletin/vbulletin 5.6.7
vbulletin/vbulletin 5.6.8
vbulletin/vbulletin 5.6.9
Published Feb 03, 2023
Tracked Since Feb 18, 2026