AI description
CVE-2025-48827 affects vBulletin versions 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3. The vulnerability allows unauthenticated users to invoke protected API controller methods when running on PHP 8.1 or later. This can be exploited using the `/api.php?method=protectedMethod` pattern. The flaw arises from the misuse of PHP's Reflection API within vBulletin's API controller logic, particularly in PHP 8.1, which allows the invocation of protected and private methods through `ReflectionMethod::invoke()`. Attackers can exploit the flaw by directly invoking internal protected methods not intended for external access. The `vB_Api_Ad::replaceAdTemplate()` method can act as a remote code execution (RCE) vector by allowing the creation or modification of advertisement templates, where malicious code can be injected.
- Description
- vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later, as demonstrated by the /api.php?method=protectedMethod pattern, as exploited in the wild in May 2025.
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 10
- Impact score
- 6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- cve@mitre.org
- CWE-424
- Hype score
- Not currently trending
🚨CVE-2025-48827 and CVE-2025-48828: vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 Remote Code Execution Vulnerabilities FOFA Link: https://t.co/qWSiRQJ33D FOFA Query: app="vBulletin" Results: 26,046 https://t.co/nClEDMSzFO Link: https://t.co/LIk5a7ZTxj Query: https:
@DarkWebInformer
4 Jun 2025
7676 Impressions
14 Retweets
77 Likes
28 Bookmarks
2 Replies
0 Quotes
vBulletin Exploits (CVE-2025-48827, CVE-2025-48828), (Tue, Jun 3rd) https://t.co/If70utZffE #SANS #Cybersecurity
@PoseidonTPA
3 Jun 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
vBulletin Exploits (CVE-2025-48827, CVE-2025-48828), (Tue, Jun 3rd) #CISO https://t.co/DIinCd1jpC
@compuchris
3 Jun 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
vBulletin Exploits (CVE-2025-48827, CVE-2025-48828) https://t.co/Vo0UulRUpu https://t.co/cQ4lI0nska
@sans_isc
3 Jun 2025
1394 Impressions
4 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
Two critical vulnerabilities in vBulletin (CVE-2025-48827 and CVE-2025-48828) have been discovered, with active exploitation reported. These flaws allow remote code execution via template engine abuse, affecting versions 5.0.0 to 5.7.5 and 6.0.0 to 6. https://t.co/a6X3w4Dnws
@securityRSS
2 Jun 2025
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical vBulletin vulnerability (CVE-2025-48827, 48828) permits unauthenticated remote code execution. Exploited shortly after patch in April 2024, attack attempts detected since May 25. Stay vigilant. 🖥️ #BugAlert #CyberAlert #UK https://t.co/CKnx1dHynr
@TweetThreatNews
2 Jun 2025
100 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 vBulletin forums are under attack! Two unauthenticated RCE bugs (CVE-2025-48827 & CVE-2025-48828) threaten any 5.x/6.x install on PHP 8.1+. Don’t wait until compromise—learn how to secure your community here: https://t.co/PMdKkR1oJL 🔒 #infosec https://t.co/YwDHuJ
@BaseFortify
2 Jun 2025
77 Impressions
1 Retweet
1 Like
0 Bookmarks
1 Reply
1 Quote
Two critical vulnerabilities in vBulletin (CVE-2025-48827 and CVE-2025-48828) expose thousands of forums, allowing unauthenticated attackers to gain Remote Code Execution. With a CVSS score of up to 10.0, exploiting these flaws enables attackers to seize full control of affect...
@CybrPulse
2 Jun 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 Critical vBulletin RCE exploits ACTIVE! 🚨 CVE-2025-48827/48828 allow unauthenticated attackers to run code remotely. Update to 6.0.4+, patch, and monitor `/ajax/api/ad/replaceAdTemplate`. Stay secure! 🛡️ #Cybersecurity #vBulletin #RCE https://t.co/d5QuoQYhNU
@fernandokarl
2 Jun 2025
61 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【リンク集:5月31日〜6月2日のセキュリティ関連ニュース/記事】 <脆弱性> ・フォーラム構築ソフトvBulletinの重大欠陥をハッカーが悪用(CVE-2025-48827、CVE-2025-48828) https://t.co/S17x8oTc5d ・Ubuntu、RHEL、FedoraにLinu
@MachinaRecord
2 Jun 2025
115 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Two critical vulnerabilities in vBulletin, CVE-2025-48827 and CVE-2025-48828, rated CVSS 10.0 and 9.0, impact versions 5.0.0-5.7.5 and 6.0.0-6.0.3 on PHP 8.1+. Many sites remain vulnerable despite past patches. #Security https://t.co/Siiw4vJqgv
@Strivehawk
1 Jun 2025
51 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
掲示版ソフトvBulletinの脆弱性が悪用されている。CVE-2025-48827はCVSSスコア10で、PHP 8.1以上で発現。CVE-2025-48828はCVSSスコア9.0で、テンプレートの条件の悪用による任意PHPコード実行。 https://t.co/oSBG9LMl6P
@__kokumoto
1 Jun 2025
1096 Impressions
0 Retweets
10 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2025-48827 (CVSS:10.0, CRITICAL) is Awaiting Analysis. vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' ..https://t.co/8cE7jzctfp #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
1 Jun 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Due falle critiche minacciano Linux e vBulletin: rischio di RCE e furto dati Vulnerabilità, Apport, core dump, CVE-2025-48827, CVE-2025-5054, exploit PHP, Linux, PHP Reflection, systemd-coredump, vBulletin https://t.co/Feyu3T2wmK https://t.co/tgLcakSONV
@matricedigitale
31 May 2025
50 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
CVE-2025-48827: vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later, as demonstrated by the /api.php?method=protectedMethod pattern, as exploited in the wild in May 2025.
@cyber_advising
30 May 2025
1260 Impressions
6 Retweets
12 Likes
8 Bookmarks
1 Reply
0 Quotes
Hackers are actively exploiting critical vulnerabilities CVE-2025-48827 & CVE-2025-48828 in vBulletin, enabling remote code execution via template abuse. Affected versions should update to 6.1.1 ASAP. 🔓 #vBulletin #CyberAlert #UK https://t.co/3gpYXrQp2v
@TweetThreatNews
30 May 2025
80 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
POC CVE-2025-48827 : Critical Unauthenticated API Access in vBulletin https://t.co/wU4qCtxAu5 https://t.co/sZyLhjW8Wl
@d4rk_c0r3
30 May 2025
50 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
重大な脆弱性が出ると毎回世界中で漏えい祭りが起きているvBulletinですが、今回はパッチ適用済みがどれだけあるんですかね。 CVE-2025-48827 CVE-2025-48828 Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE https:/
@autumn_good_35
30 May 2025
432 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
GitHub - 0xgh057r3c0n/CVE-2025-48827: Critical Unauthenticated API Access in vBulletin - https://t.co/zWdzsDRndQ
@piedpiper1616
30 May 2025
1477 Impressions
13 Retweets
34 Likes
10 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨CVE-2025-48827 : Critical Unauthenticated API Access in vBulletin 🔥PoC: https://t.co/ADRqJ3ToEY 🧐Deep Dive : https://t.co/aBnZeItzr4 📊 42.5K+Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link:https://t.co/Isu6ovFZCi 👇Query HUNTER :
@HunterMapping
28 May 2025
2536 Impressions
16 Retweets
36 Likes
18 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-48827 ⚠️🔴 CRITICAL (10) 🏢 vBulletin - vBulletin 🏗️ 5.0.0 🔗 https://t.co/Ai3ABffOu2 🔗 https://t.co/nfgWetrDNS #CyberCron #VulnAlert #InfoSec https://t.co/PzJGD1QMF9
@cybercronai
27 May 2025
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-48827: CRITICAL] Cyber security alert: vBulletin versions 5.0.0 to 5.7.5 and 6.0.0 to 6.0.3 are vulnerable, enabling unauthenticated users to access protected API methods on PHP 8.1+.#cve,CVE-2025-48827,#cybersecurity https://t.co/Yjd2XZBv1e https://t.co/zxYhEvCH4N
@CveFindCom
27 May 2025
61 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-48827 vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later, as d… https://t.co/U5hsda9dJb
@CVEnew
27 May 2025
540 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes