CyberSecurity news
Bill Toulas@BleepingComputer
//
Two critical vulnerabilities, CVE-2025-48827 and CVE-2025-48828, have been identified in vBulletin forum software, impacting versions 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3. The vulnerabilities enable API abuse and remote code execution, posing a significant threat to forums running the affected versions. Security experts warn that one of these vulnerabilities is already being actively exploited in the wild, making it crucial for administrators to take immediate action.
The flaws are rated as critical, with CVE-2025-48827 receiving a CVSS v3 score of 10.0 and CVE-2025-48828 receiving a score of 9.0. CVE-2025-48827 is an API method invocation issue, allowing unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later. The second flaw, CVE-2025-48828, enables attackers to run arbitrary PHP code by abusing template conditionals. Both vulnerabilities were discovered by security researcher Egidio Romano on May 23, 2025, and exploit attempts were observed in the wild shortly after disclosure.
vBulletin users are urged to immediately apply patches released last year that remediate both vulnerabilities or to upgrade to the latest version 6.1.1. The vulnerabilities were likely patched quietly last year with the release of Patch Level 1 for all versions of the 6.* release branch. Security researchers recommend that defenders and developers review their frameworks and custom APIs, especially if they are dynamically routing controller methods through Reflection. They also suggest auditing access restrictions and examining application behavior across different PHP versions to prevent similar exploits.
ImgSrc: www.bleepstatic
References :
- cyberpress.org: Severe vBulletin Forum Flaw Enables Remote Code Execution
- securityonline.info: Critical Pre-Auth RCE: vBulletin Flaw Allows Full Server Compromise (PoC Available)
- infosec.exchange: A newly discovered vulnerability in vBulletin, one of the world’s most popular forum platforms, has exposed thousands of online communities to the risk of unauthenticated Remote Code Execution
- Cyber Security News: Severe vBulletin Forum Flaw Enables Remote Code Execution
- securityaffairs.com: SecurityAffairs reports Two flaws in vBulletin forum software are under attack.
- BleepingComputer: Hackers are exploiting critical flaw in vBulletin forum software.
- www.scworld.com: Attacks exploiting maximum severity vBulletin vulnerability ongoing
Classification:
- HashTags: #vBulletin #RCE #Exploit
- Company: vBulletin
- Target: vBulletin forum users
- Product: vBulletin
- Feature: Remote Code Execution
- Malware: CVE-2025-48827, CVE-2025-48828
- Type: Vulnerability
- Severity: Critical