CVE-2025-48941: CWE-1230: Exposure of Sensitive Information Through Metadata in mybb mybb
MyBB is free and open source forum software. Prior to version 1.8.39, the search component does not validate permissions correctly, which allows attackers to determine the existence of hidden (draft, unapproved, or soft-deleted) threads containing specified text in the title. The visibility state (`mybb_threads.visible` integer column) of threads is not validated in internal search queries, whose result is used to output a general success or failure of the search. While MyBB validates permissions when displaying the final search results, a search operation that internally produces at least one result outputs a redirect response (as a HTTP redirect, or a success message page with delayed redirect, depending on configuration). On the other hand, a search operation that internally produces no results outputs a corresponding message in the response without a redirect. This allows a user to determine whether threads matching title search parameters exist, including draft threads (`visible` with a value of `-2`), soft-deleted threads (`visible` with a value of `-1`), and unapproved threads (`visible` with a value of `0`); in addition to displaying generally visible threads (`visible` with a value of `1`). This vulnerability does not affect other layers of permissions. In order to exploit the vulnerability, the user must have access to the search functionality, and general access to forums containing the thread(s). The vulnerability does not expose the message content of posts. MyBB 1.8.39 resolves this issue.
AI Analysis
Technical Summary
CVE-2025-48941 is a medium-severity vulnerability affecting MyBB forum software versions prior to 1.8.39. The issue lies in the search component's improper validation of thread visibility permissions during internal search queries. Specifically, the internal search mechanism does not correctly check the 'visible' status of threads, which is stored in the 'mybb_threads.visible' integer column. This column indicates whether a thread is generally visible (1), unapproved (0), soft-deleted (-1), or a draft (-2). Although MyBB enforces permission checks when displaying final search results, the internal search query's outcome influences the HTTP response behavior. If the search internally finds at least one matching thread (regardless of visibility status), the server responds with a redirect or a success message page with delayed redirect. Conversely, if no matches are found, it returns a message without redirect. This difference in response behavior allows an attacker with access to the search functionality and general forum access to infer the existence of hidden threads (draft, unapproved, or soft-deleted) based on the presence or absence of redirects. Notably, the vulnerability does not expose the content of posts, only the existence of such threads. Exploitation requires no authentication beyond access to the search feature and forums containing the threads. The vulnerability is classified under CWE-1230 (Exposure of Sensitive Information Through Metadata). The issue was addressed in MyBB version 1.8.39 by correcting permission validation in search queries. The CVSS v3.1 base score is 5.3 (medium), reflecting the limited confidentiality impact and ease of exploitation without authentication or user interaction. There are no known exploits in the wild at this time.
Potential Impact
For European organizations using MyBB forum software, this vulnerability could lead to unauthorized disclosure of metadata about hidden forum threads. While the actual content of posts remains protected, the ability to detect the existence of draft, unapproved, or soft-deleted threads may reveal sensitive operational or organizational information, such as planned discussions, moderation activities, or internal deliberations not meant for public view. This could undermine trust in the forum's confidentiality and potentially expose strategic or sensitive topics prematurely. In regulated environments, such as those governed by GDPR, unauthorized exposure of metadata might raise compliance concerns if it indirectly reveals personal or sensitive information. Additionally, attackers could use this information to tailor social engineering or further reconnaissance attacks. However, since the vulnerability does not allow content disclosure or modification, the impact on integrity and availability is minimal. The medium severity rating reflects this limited but non-negligible confidentiality risk.
Mitigation Recommendations
European organizations should upgrade all MyBB installations to version 1.8.39 or later, where the vulnerability is fixed. If immediate upgrading is not feasible, administrators can implement the following mitigations: 1) Restrict access to the search functionality to trusted users only, possibly by requiring authentication or limiting search permissions to reduce exposure. 2) Customize or harden the search response behavior to avoid revealing differences in HTTP redirects or messages that could be used as side channels to infer thread existence. 3) Regularly audit forum permissions and visibility settings to ensure that sensitive threads are appropriately protected or archived outside the forum if necessary. 4) Monitor forum logs for unusual search patterns that might indicate probing attempts. 5) Consider deploying web application firewalls (WAFs) with rules to detect and block suspicious search queries targeting thread titles. These steps, combined with prompt patching, will effectively mitigate the risk posed by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-48941: CWE-1230: Exposure of Sensitive Information Through Metadata in mybb mybb
Description
MyBB is free and open source forum software. Prior to version 1.8.39, the search component does not validate permissions correctly, which allows attackers to determine the existence of hidden (draft, unapproved, or soft-deleted) threads containing specified text in the title. The visibility state (`mybb_threads.visible` integer column) of threads is not validated in internal search queries, whose result is used to output a general success or failure of the search. While MyBB validates permissions when displaying the final search results, a search operation that internally produces at least one result outputs a redirect response (as a HTTP redirect, or a success message page with delayed redirect, depending on configuration). On the other hand, a search operation that internally produces no results outputs a corresponding message in the response without a redirect. This allows a user to determine whether threads matching title search parameters exist, including draft threads (`visible` with a value of `-2`), soft-deleted threads (`visible` with a value of `-1`), and unapproved threads (`visible` with a value of `0`); in addition to displaying generally visible threads (`visible` with a value of `1`). This vulnerability does not affect other layers of permissions. In order to exploit the vulnerability, the user must have access to the search functionality, and general access to forums containing the thread(s). The vulnerability does not expose the message content of posts. MyBB 1.8.39 resolves this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-48941 is a medium-severity vulnerability affecting MyBB forum software versions prior to 1.8.39. The issue lies in the search component's improper validation of thread visibility permissions during internal search queries. Specifically, the internal search mechanism does not correctly check the 'visible' status of threads, which is stored in the 'mybb_threads.visible' integer column. This column indicates whether a thread is generally visible (1), unapproved (0), soft-deleted (-1), or a draft (-2). Although MyBB enforces permission checks when displaying final search results, the internal search query's outcome influences the HTTP response behavior. If the search internally finds at least one matching thread (regardless of visibility status), the server responds with a redirect or a success message page with delayed redirect. Conversely, if no matches are found, it returns a message without redirect. This difference in response behavior allows an attacker with access to the search functionality and general forum access to infer the existence of hidden threads (draft, unapproved, or soft-deleted) based on the presence or absence of redirects. Notably, the vulnerability does not expose the content of posts, only the existence of such threads. Exploitation requires no authentication beyond access to the search feature and forums containing the threads. The vulnerability is classified under CWE-1230 (Exposure of Sensitive Information Through Metadata). The issue was addressed in MyBB version 1.8.39 by correcting permission validation in search queries. The CVSS v3.1 base score is 5.3 (medium), reflecting the limited confidentiality impact and ease of exploitation without authentication or user interaction. There are no known exploits in the wild at this time.
Potential Impact
For European organizations using MyBB forum software, this vulnerability could lead to unauthorized disclosure of metadata about hidden forum threads. While the actual content of posts remains protected, the ability to detect the existence of draft, unapproved, or soft-deleted threads may reveal sensitive operational or organizational information, such as planned discussions, moderation activities, or internal deliberations not meant for public view. This could undermine trust in the forum's confidentiality and potentially expose strategic or sensitive topics prematurely. In regulated environments, such as those governed by GDPR, unauthorized exposure of metadata might raise compliance concerns if it indirectly reveals personal or sensitive information. Additionally, attackers could use this information to tailor social engineering or further reconnaissance attacks. However, since the vulnerability does not allow content disclosure or modification, the impact on integrity and availability is minimal. The medium severity rating reflects this limited but non-negligible confidentiality risk.
Mitigation Recommendations
European organizations should upgrade all MyBB installations to version 1.8.39 or later, where the vulnerability is fixed. If immediate upgrading is not feasible, administrators can implement the following mitigations: 1) Restrict access to the search functionality to trusted users only, possibly by requiring authentication or limiting search permissions to reduce exposure. 2) Customize or harden the search response behavior to avoid revealing differences in HTTP redirects or messages that could be used as side channels to infer thread existence. 3) Regularly audit forum permissions and visibility settings to ensure that sensitive threads are appropriately protected or archived outside the forum if necessary. 4) Monitor forum logs for unusual search patterns that might indicate probing attempts. 5) Consider deploying web application firewalls (WAFs) with rules to detect and block suspicious search queries targeting thread titles. These steps, combined with prompt patching, will effectively mitigate the risk posed by this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-28T18:49:07.581Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dcda1182aa0cae24b862f
Added to database: 6/2/2025, 4:13:21 PM
Last enriched: 7/3/2025, 4:57:49 PM
Last updated: 8/2/2025, 2:33:05 AM
Views: 13
Related Threats
CVE-2025-3892: CWE-250: Execution with Unnecessary Privileges in Axis Communications AB AXIS OS
MediumCVE-2025-30027: CWE-1287: Improper Validation of Specified Type of Input in Axis Communications AB AXIS OS
MediumCVE-2025-7622: CWE-918: Server-Side Request Forgery (SSRF) in Axis Communications AB AXIS Camera Station Pro
MediumCVE-2025-8314: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in emarket-design Project Management, Bug and Issue Tracking Plugin – Software Issue Manager
MediumCVE-2025-8059: CWE-862 Missing Authorization in bplugins B Blocks – The ultimate block collection
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.