Critical vBulletin vulnerability exploited in the wild

Critical vBulletin vulnerability exploited in the wild

Two critical security vulnerabilities has been discovered in the popular open-source forum software vBulletin, with one of the flaws confirmed to be actively exploited in the wild.

The vulnerabilities, tracked as CVE-2025-48827 and CVE-2025-48828, affect vBulletin versions 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 running on PHP 8.1 or newer. The flaws stem from improper use of PHP’s Reflection API and weaknesses in vBulletin’s template engine.

The issue allows unauthorized users to invoke protected methods, bypassing traditional security mechanisms and leading to full remote code execution (RCE) on vulnerable systems.

According to security researcher Ryan Dewhurst, CVE-2025-48827 is already being exploited. Monitoring honeypots, Dewhurst observed attack attempts targeting the vulnerable ajax/api/ad/replaceAdTemplate endpoint, with some traced to threat actors in Poland. The attacks appear to use the public exploit and aim to drop PHP-based backdoors for command execution.

Although only CVE-2025-48827 has been observed in real-world attacks so far, security experts warn that chaining the vulnerabilities to achieve full RCE is not only possible but likely. Notably, Nuclei detection templates for the flaws have been available since May 24.

vBulletin, a widely used PHP/MySQL-based platform powering thousands of forums worldwide, had quietly addressed the flaws in Patch Level 1 for the 6.x release and 5.7.5 Patch Level 3, likely issued last year.

Administrators are strongly urged to upgrade to version 6.1.1 or immediately apply the latest security patches to protect against potential compromise.


Back to the list

Latest Posts

Cyber Security Week in Review: June 20, 2025

Cyber Security Week in Review: June 20, 2025

In brief: the Langflow, TP-Link and Zyxel flaws exploited in the wild, Russian hackers use ASPs to infiltrate victims’ email accounts, and more
20 June 2025
Russian-linked hackers exploit Google App passwords in email espionage campaign

Russian-linked hackers exploit Google App passwords in email espionage campaign

Victims were tricked into creating and sharing ASPs under the mistaken belief that they are enabling secure communication with the US Department of State.
19 June 2025
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

Using custom-developed malware, including ransomware such as LockerGoga, MegaCortex, HIVE and Dharma, the hackers encrypted data on corporate networks.
18 June 2025