10 CVE-2025-48827

Exploit
 

vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later, as demonstrated by the /api.php?method=protectedMethod pattern, as exploited in the wild in May 2025.
https://nvd.nist.gov/vuln/detail/CVE-2025-48827

Categories

CWE-424 : Improper Protection of Alternate Path
The product does not sufficiently protect all possible paths that a user can take to access restricted functionality or resources. Deploy different layers of protection to implement security in depth. Access-control setting in web-based document collaboration tool is not properly implemented by the code, which prevents listing hidden directories but does not prevent direct requests to files in those directories.

References

134c704f-9b21-4f2e-91b3-4a467353bcc0

cve@mitre.org Exploit


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:* >= 5.0.0 <= 5.7.5
cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:* >= 6.0.0 <= 6.0.3


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
https://github.com/wiseep/CVE-2025-48827
https://github.com/SystemVll/CVE-2025-48827

Other Nist (github, ...)

Url
https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
127 Directory Indexing
Medium
554 Functionality Bypass
High


MITRE


Techniques

id description
T1083 File and Directory Discovery
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.