We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.
Reserved 2025-05-27 | Published 2025-05-27 | Updated 2025-05-27 | Assigner mitreCWE-424 Improper Protection of Alternate Path
karmainsecurity.com/...l-that-protected-method-vbulletin-rce
Support options