Two vital vulnerabilities—CVE-2025-48827 and CVE-2025-48828—have been assigned to vBulletin, the broadly used PHP/MySQL discussion board software program, following public disclosure and noticed exploitation within the wild.
The issues, affecting vBulletin variations 5.0.0 by means of 6.0.3, allow unauthenticated attackers to realize Distant Code Execution (RCE), placing 1000’s of on-line communities in danger.
Reflection API Abuse and Template Engine Bypass
The vulnerabilities stem from a mix of architectural oversights and adjustments in PHP 8.1’s dealing with of technique visibility.
vBulletin’s API controller logic misuses PHP’s Reflection API, particularly permitting the invocation of protected
and even personal
strategies through ReflectionMethod::invoke()
.
When operating on PHP 8.1 or later, this flaw permits attackers to straight name inside strategies that have been by no means meant to be externally accessible.
The primary vulnerability (CVE-2025-48827) includes the power for unauthenticated customers to invoke protected API controller strategies, utilizing crafted requests to endpoints akin to /ajax/api/advert/replaceAdTemplate
.
The second (CVE-2025-48828) leverages template engine weaknesses, the place attackers inject malicious PHP code into templates utilizing crafted
conditionals.
This code can then be executed by triggering a render request, bypassing built-in safety checks and filters.
Instance Exploit Payload:
php
This payload, submitted through an HTTP POST request, permits attackers to execute arbitrary system instructions on the server as the net server person (generally www-data
on Linux).
Exploitation Timeline and Detection
The vulnerabilities have been first publicly disclosed on Could 23, 2025, by researcher Egidio Romano (EgiX), with proof-of-concept (PoC) code launched the identical day.
Inside days, safety researchers noticed energetic exploitation makes an attempt, together with assaults traced to an IP deal with in Poland concentrating on the susceptible endpoint.
The assaults used the unique PoC moderately than automated scanning templates, indicating focused exploitation.
The SANS Web Storm Middle and a number of honeypots reported probes and exploit makes an attempt starting Could 25, 2025.
The issues have been formally assigned CVEs on Could 27, 2025, and added to the Recognized Exploited Vulnerabilities (KEV) listing.
Pattern Assault Log Desk
Date & Time (UTC) | Endpoint Accessed | Supply IP | Consumer Agent |
---|---|---|---|
2025-05-26 08:23:28.193 | ajax/api/advert/replaceAdTemplate | 195.3.221.137 | Mozilla/5.0 (Home windows NT 10.0; Win64; x64) Chrome/131.0.6778.140 |
2025-05-26 08:23:28.242 | ajax/api/advert/replaceAdTemplate | 195.3.221.137 | Mozilla/5.0 (Home windows NT 10.0; Win64; x64) Chrome/131.0.6778.140 |
2025-05-26 08:24:33.429 | ajax/api/advert/replaceAdTemplate | 195.3.221.137 | Mozilla/5.0 (Home windows NT 10.0; Win64; x64) Chrome/131.0.6778.140 |

Affect, Affected Variations, and Mitigation
The vulnerabilities are rated vital, with CVSS v3.1 scores of 10.0 and 9.0, respectively. They impression vBulletin variations 5.0.0 by means of 5.7.5 and 6.0.0 by means of 6.0.3, particularly when operating on PHP 8.1 or later.
Profitable exploitation grants attackers full management over the server, probably resulting in knowledge theft, defacement, or additional compromise of related techniques.
Mitigation Steps:
- Improve instantly to vBulletin 6.0.4 or later, or apply Patch Stage 1 for affected 6.x variations and Patch Stage 3 for five.7.5.
- Scan for susceptible installations utilizing instruments akin to Qualys QID 732555.
- Monitor logs for suspicious entry to
ajax/api/advert/replaceAdTemplate
.
Abstract Desk: Affected and Patched Variations
vBulletin Model | Patch Stage Required | Standing |
---|---|---|
5.0.0 – 5.7.5 | Patch Stage 3 | Patched |
6.0.0 – 6.0.3 | Patch Stage 1 | Patched |
6.0.4+ | N/A | Not Weak |
6.1.1 | N/A | Not Weak |
The task of CVE-2025-48827 and CVE-2025-48828 marks these vBulletin flaws as vital, with energetic exploitation confirmed.
Directors are urged to patch instantly and audit their techniques, as attackers are leveraging these vulnerabilities to realize full management over susceptible discussion board installations.
Discover this Information Attention-grabbing! Observe us on Google Information, LinkedIn, & X to Get Prompt Updates!