CVE-2025-48828

CRITICAL

CVSS v3

9

CRITICAL

EPSS Score

73.7%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.

Technical Details

CVSS v3 Vector
3.1
Published
5/27/2025
Last Modified
6/25/2025

Frequently Asked Questions

What is CVE-2025-48828?

Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.

Is CVE-2025-48828 actively exploited?

Active exploitation of CVE-2025-48828 has not been confirmed. The EPSS score is 73.7%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-48828?

CVE-2025-48828 has a CVSS v3 base score of 9 (CRITICAL severity), with vector string 3.1.

Is CVE-2025-48828 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.