CVE-2025-48828
CRITICALCVSS v3
9
CRITICAL
EPSS Score
73.7%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 5/27/2025
- Last Modified
- 6/25/2025
Frequently Asked Questions
What is CVE-2025-48828?
Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.
Is CVE-2025-48828 actively exploited?
Active exploitation of CVE-2025-48828 has not been confirmed. The EPSS score is 73.7%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2025-48828?
CVE-2025-48828 has a CVSS v3 base score of 9 (CRITICAL severity), with vector string 3.1.
Is CVE-2025-48828 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.