CVE-2025-48828
CRITICAL EXPLOITED NUCLEIvBulletin - RCE
Title source: llmDescription
Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.
Exploits (2)
nomisec
WORKING POC
by ill-deed · remote
https://github.com/ill-deed/vBulletin-CVE-2025-48828-Multi-target
metasploit
WORKING POC
EXCELLENT
by Egidio Romano (EgiX), Valentin Lobstein · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/vbulletin_replace_ad_template_rce.rb
Nuclei Templates (1)
vBulletin replaceAdTemplate - Remote Code Execution
CRITICALVERIFIEDby DhiyaneshDK, Chocapikk
Shodan:
http.component:"vBulletin"
FOFA:
app="vBulletin"
Scores
CVSS v3
9.0
EPSS
0.7368
EPSS Percentile
98.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
VulnCheck KEV
2025-05-26
CWE
CWE-424
Status
published
Products (1)
vbulletin/vbulletin
6.0.3
Published
May 27, 2025
Tracked Since
Feb 18, 2026