Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

vBulletin Vulnerability Exploited in the Wild

Exploitation of the vBulletin vulnerability tracked as CVE-2025-48827 and CVE-2025-48828 started shortly after disclosure.

A critical vulnerability affecting the vBulletin forum software is being exploited in the wild, with attacks starting shortly after disclosure.

Researcher Egidio Romano published a blog post on May 23 to describe a vBulletin vulnerability that can be exploited for unauthenticated remote code execution. Romano made public technical details, as well as proof-of-concept (PoC) code.

The researcher confirmed that exploitation is possible against forums powered by vBulletin versions 5.1.0, 5.7.5, 6.0.1 and 6.0.3, noting that the vulnerability was apparently patched back in April 2024, without any CVE identifier being assigned. 

A few days after Romano’s blog post was published, KEVIntel reported seeing exploitation attempts against its honeypots starting on May 26. The attack attempts, which involved requests designed to execute the ‘cmd’ command, were based on Romano’s PoC exploit.

Honeypots maintained by SANS have also seen dozens of exploitation attempts since May 25. 

It’s unclear what exactly the attackers have done after exploiting the vulnerability.

The CVE identifiers CVE-2025-48827 and CVE-2025-48828 have now been assigned to the security hole, one CVE for a protected method invocation issue and one for remote code execution through the template engine.  

In-the-wild exploitation of vBulletin vulnerabilities does not appear to be common these days. There has been no news of attacks targeting flaws in vBulletin since 2020. A related vBulletin vulnerability was exploited prior to that in 2019

Advertisement. Scroll to continue reading.

Those are the only two vBulletin vulnerabilities currently included in CISA’s Known Exploited Vulnerabilities (KEV) catalog. CVE-2025-48827 and CVE-2025-48828 have yet to be added.

Related: Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks

Related: Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances

Related: Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Jessica Newman has joined Sophos as General Manager of Global Cyber Insurance.

Breach and attack simulation solutions provider AttackIQ has appointed Pete Luban as Field Chief Information Security Officer.

Matthew Cowell has assumed the role of VP of Strategic Alliances at Nozomi Networks. He previously served in the same role at Dragos.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.