{"uuid": "da7f231c-1ca2-44d1-904d-f9b003c9a786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48828", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17607", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48828\n\ud83d\udd25 CVSS Score: 9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the \"var_dump\"(\"test\") syntax, attackers can bypass security checks and execute arbitrary PHP code.\n\ud83d\udccf Published: 2025-05-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-27T03:52:58.855Z\n\ud83d\udd17 References:\n1. https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce", "creation_timestamp": "2025-05-27T04:47:58.000000Z"}