Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

vBulletin Vulnerability Exploited in the Wild

Posted on June 2, 2025June 2, 2025 By CWS

A crucial vulnerability affecting the vBulletin discussion board software program is being exploited within the wild, with assaults beginning shortly after disclosure.

Researcher Egidio Romano printed a weblog publish on Could 23 to explain a vBulletin vulnerability that may be exploited for unauthenticated distant code execution. Romano made public technical particulars, in addition to proof-of-concept (PoC) code.

The researcher confirmed that exploitation is feasible in opposition to boards powered by vBulletin variations 5.1.0, 5.7.5, 6.0.1 and 6.0.3, noting that the vulnerability was apparently patched again in April 2024, with none CVE identifier being assigned. 

A number of days after Romano’s weblog publish was printed, KEVIntel reported seeing exploitation makes an attempt in opposition to its honeypots beginning on Could 26. The assault makes an attempt, which concerned requests designed to execute the ‘cmd’ command, have been based mostly on Romano’s PoC exploit.

Honeypots maintained by SANS have additionally seen dozens of exploitation makes an attempt since Could 25. 

It’s unclear what precisely the attackers have executed after exploiting the vulnerability.

The CVE identifiers CVE-2025-48827 and CVE-2025-48828 have now been assigned to the safety gap, one CVE for a protected methodology invocation problem and one for distant code execution by the template engine.  

In-the-wild exploitation of vBulletin vulnerabilities doesn’t look like widespread today. There was no information of assaults focusing on flaws in vBulletin since 2020. A associated vBulletin vulnerability was exploited previous to that in 2019. Commercial. Scroll to proceed studying.

These are the one two vBulletin vulnerabilities at the moment included in CISA’s Identified Exploited Vulnerabilities (KEV) catalog. CVE-2025-48827 and CVE-2025-48828 have but to be added.

Associated: Cityworks Zero-Day Exploited by Chinese language Hackers in US Native Authorities Assaults

Associated: Fortinet Patches Zero-Day Exploited Towards FortiVoice Home equipment

Associated: Ivanti Patches Two EPMM Zero-Days Exploited to Hack Prospects

Security Week News Tags:Exploited, vBulletin, Vulnerability, Wild

Post navigation

Previous Post: 50,000+ Azure AD Users Access Token Exposed From Unauthenticated API Endpoint
Next Post: Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU

Related Posts

Legitimate Shellter Pen-Testing Tool Used in Malware Attacks Security Week News
Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Security Week News
743,000 Impacted by McLaren Health Care Data Breach Security Week News
Dell Says Data Leaked by Hackers Is Fake Security Week News
Security Firm Andy Frain Says 100,000 People Impacted by Ransomware Attack Security Week News
364,000 Impacted by Data Breach at LexisNexis Risk Solutions Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution
  • Chrome V8 JavaScript Engine Vulnerability Let Attackers Execute Remote Code
  • Cavalry Werewolf APT Hackers Attacking Multiple Industries With FoalShell and StallionRAT
  • Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework
  • Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution
  • Chrome V8 JavaScript Engine Vulnerability Let Attackers Execute Remote Code
  • Cavalry Werewolf APT Hackers Attacking Multiple Industries With FoalShell and StallionRAT
  • Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework
  • Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News