Metrics
Affected Vendors & Products
Tue, 27 May 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
ssvc
|
Tue, 27 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
ssvc
|
Tue, 27 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 27 May 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code. | Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025. |
References |
|
Tue, 27 May 2025 04:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code. | |
Weaknesses | CWE-424 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-05-27T00:00:00.000Z
Updated: 2025-05-27T18:04:16.774Z
Reserved: 2025-05-27T00:00:00.000Z
Link: CVE-2025-48828

Updated: 2025-05-27T13:59:25.699Z

Status : Awaiting Analysis
Published: 2025-05-27T04:15:45.033
Modified: 2025-05-28T15:01:30.720
Link: CVE-2025-48828

No data.