First published: Fri Feb 03 2023(Updated: )
vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
vBulletin vBulletin | =5.6.7 | |
vBulletin vBulletin | =5.6.8 | |
vBulletin vBulletin | =5.6.9 | |
WP Engine Better Search Replace | =1.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue in vBulletin is CVE-2023-25135.
The impact of the vulnerability CVE-2023-25135 in vBulletin is that an unauthenticated remote attacker can execute arbitrary code.
The vulnerability CVE-2023-25135 in vBulletin occurs due to a crafted HTTP request that triggers deserialization.
No, authentication is not required for the exploitation of CVE-2023-25135 in vBulletin.
To fix the vulnerability CVE-2023-25135 in vBulletin, update to the fixed versions which are 5.6.9 PL1 or later.