CVE-2023-25135
CRITICAL EXPLOITED NUCLEIVbulletin - Insecure Deserialization
Title source: ruleDescription
vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.
Exploits (1)
Nuclei Templates (1)
vBulletin <= 5.6.9 - Pre-authentication Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
http.component:"vBulletin" || http.html:"powered by vbulletin" || http.component:"vbulletin" || http.title:"powered by vbulletin" || cpe:"cpe:2.3:a:vbulletin:vbulletin"
FOFA:
body="powered by vbulletin" || title="powered by vbulletin"
Scores
CVSS v3
9.8
EPSS
0.9334
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2023-12-04
Classification
CWE
CWE-502
Status
published
Affected Products (3)
vbulletin/vbulletin
vbulletin/vbulletin
vbulletin/vbulletin
Timeline
Published
Feb 03, 2023
Tracked Since
Feb 18, 2026