Monday, June 2, 2025
HomeTechnologyHackers are exploiting important flaw in vBulletin discussion board software program

Hackers are exploiting important flaw in vBulletin discussion board software program

Hackers are exploiting important flaw in vBulletin discussion board software program

Two important vulnerabilities affecting the open-source discussion board software program vBulletin have been found, with one confirmed to be actively exploited within the wild.

The issues, tracked underneath CVE-2025-48827 and CVE-2025-48828, and rated important (CVSS v3 rating: 10.0 and 9.0 respectively), are an API methodology invocation and a distant code execution (RCE) by way of template engine abuse flaws.

They influence vBulletin variations 5.0.0 by means of 5.7.5 and 6.0.0 by means of 6.0.3 when the platform runs on PHP 8.1 or later.

The vulnerabilities have been seemingly patched quietly final yr with the discharge of Patch Degree 1 for all variations of the 6.* launch department, and model 5.7.5 Patch Degree 3, however many websites remained uncovered as a consequence of not upgrading.

Public PoC and energetic exploitation

The 2 points have been found on Might 23, 2025, by safety researcher Egidio Romano (EgiX), who defined the best way to exploit it by way of an in depth technical publish on his weblog.

The researcher confirmed that the flaw lies in vBulletin’s misuse of PHP’s Reflection API, which, as a consequence of behavioral modifications launched in PHP 8.1, permits protected strategies to be invoked with out specific accessibility changes.

The vulnerability chain lies within the capacity to invoke protected strategies by way of crafted URLs and the misuse of template conditionals inside vBulletin’s template engine.

By injecting crafted template code utilizing the susceptible ‘replaceAdTemplate’ methodology, attackers bypass “unsafe perform” filters utilizing methods like PHP variable perform calls.

This leads to absolutely distant, unauthenticated code execution on the underlying server — successfully granting attackers shell entry as the net server consumer (www-data on Linux, for instance).

On Might 26, safety researcher Ryan Dewhurst reported seeing exploitation makes an attempt on honeypot logs exhibiting requests to the susceptible ‘ajax/api/advert/replaceAdTemplate’ endpoint.

Logs showing exploitation attempts
Logs exhibiting exploitation makes an attempt
Supply: weblog.kevintel.com

Dewhurst traced one of many attackers to Poland, seeing makes an attempt to deploy PHP backdoors to execute system instructions.

The researcher famous that the assaults seem like leveraging the exploit printed earlier by Romano, although there have been Nuclei templates out there for the flaw since Might 24, 2025.

You will need to make clear that Dewhurst solely noticed exploitation makes an attempt for CVE-2025-48827, however no proof exists but that attackers have efficiently chained it to the complete RCE, though that is extremely seemingly.

vBulletin troubles

vBulletin is among the most generally used business PHP/MySQL-based discussion board platforms, powering hundreds of on-line communities globally.

Its modular design, together with cellular APIs and AJAX interfaces, makes it a posh and versatile platform. Nevertheless, it additionally exposes a broad assault floor.

Prior to now, hackers have leveraged extreme flaws within the platform to breach in style boards and steal the delicate knowledge of giant numbers of customers.

Discussion board directors are beneficial to use the safety updates for his or her vBulletin set up or transfer to the newest launch, model 6.1.1, which isn’t affected by the mentioned flaws.

Based mostly on an evaluation of 14M malicious actions, uncover the highest 10 MITRE ATT&CK methods behind 93% of assaults and the best way to defend in opposition to them.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments