Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.
References
Configurations
No configuration.
History
27 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 May 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
|
Summary | (en) Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025. |
27 May 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-27 04:15
Updated : 2025-05-28 15:01
NVD link : CVE-2025-48828
Mitre link : CVE-2025-48828
CVE.ORG link : CVE-2025-48828
JSON object : View
Products Affected
No product.
CWE
CWE-424
Improper Protection of Alternate Path