CVE-2025-48828
Certain vBulletin versions might allow attackers to execute arbitrary PHP
Description
Description
Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Affected Vendors & Products
| Vendor | Product | Version |
|---|---|---|
| vbulletin | vbulletin | 6.0.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-424 | The product does not sufficiently protect all possible paths that a user can take to access restricted functionality or resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
How can this vulnerability impact me? :
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart
Meta Information
CVE Publication Date:
2025-05-27
CVE Last Modified Date:
2025-06-25
Report Generation Date:
2025-11-04
AI Powered Q&A Generation:
2025-05-28
EPSS Last Evaluated Date:
2025-08-20
NVD Report Link: