CVE-2026-9357: Cross Site Scripting in vBulletin
A vulnerability was found in vBulletin 6.x. This impacts an unknown function of the component Login. Performing a manipulation results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used. VulDB is withholding an extended redistribution of exploit details to prevent simplified exploitation. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
This vulnerability in vBulletin 6.x involves a cross-site scripting flaw in the Login component, which can be triggered remotely without authentication. The exact function affected is unknown. The vulnerability allows an attacker to inject malicious scripts that could be executed in the context of a victim's browser. Public exploit details exist but are partially withheld to limit ease of exploitation. No official vendor response or remediation has been provided as of the publication date.
Potential Impact
Successful exploitation could enable attackers to execute arbitrary scripts in users' browsers, potentially leading to session hijacking, defacement, or other client-side attacks. The vulnerability requires user interaction and has a medium impact level. There is no indication of privilege escalation or server-side compromise from the available data.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since the vendor has not responded or released a fix, users should monitor official vBulletin channels for updates. In the meantime, consider applying web application firewall (WAF) rules to detect and block XSS attempts targeting the Login component. Avoid exposing the vulnerable component to untrusted users if possible.
CVE-2026-9357: Cross Site Scripting in vBulletin
Description
A vulnerability was found in vBulletin 6.x. This impacts an unknown function of the component Login. Performing a manipulation results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used. VulDB is withholding an extended redistribution of exploit details to prevent simplified exploitation. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability in vBulletin 6.x involves a cross-site scripting flaw in the Login component, which can be triggered remotely without authentication. The exact function affected is unknown. The vulnerability allows an attacker to inject malicious scripts that could be executed in the context of a victim's browser. Public exploit details exist but are partially withheld to limit ease of exploitation. No official vendor response or remediation has been provided as of the publication date.
Potential Impact
Successful exploitation could enable attackers to execute arbitrary scripts in users' browsers, potentially leading to session hijacking, defacement, or other client-side attacks. The vulnerability requires user interaction and has a medium impact level. There is no indication of privilege escalation or server-side compromise from the available data.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since the vendor has not responded or released a fix, users should monitor official vBulletin channels for updates. In the meantime, consider applying web application firewall (WAF) rules to detect and block XSS attempts targeting the Login component. Avoid exposing the vulnerable component to untrusted users if possible.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-05-23T09:39:47.115Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a1297c609f6977edb24a743
Added to database: 5/24/2026, 6:16:38 AM
Last enriched: 5/24/2026, 6:31:44 AM
Last updated: 5/24/2026, 7:27:08 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.