Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3032 articles · 107128 vulns · 38/41 feeds (7d)
← Back to list
8.8
CVE-2025-71281EXPLOITEDPATCHED
xenforo · xenforo

XenForo Template Method Call Restriction Bypass

Description

XenForo before 2.3.7 does not properly restrict methods callable from within templates. A loose prefix match was used instead of a stricter first-word match for methods accessible through callbacks and variable method calls in templates, potentially allowing unauthorized method invocations.

Affected Products

VendorProductVersions
xenforoxenforo2.3.0

References

  • https://xenforo.com/community/threads/xenforo-2-3-7-released-includes-security-fixes.232121/(vendor-advisory, patch)
  • https://www.vulncheck.com/advisories/xenforo-template-method-call-restriction-bypass(third-party-advisory)

Related News (1 articles)

Tier C
VulDB15h ago
CVE-2025-71281 | XenForo up to 2.3.6 code injection
→ No new info (linked only)
CVSS 3.18.8 NONE
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
2.3.7
CWECWE-94
PublishedApr 1, 2026
Last enriched15h agov2
Trending Score37
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

NONECVE-2026-35056EXPKEV
XenForo Remote Code Execution via Authenticated Admin
Trending: 83
NONECVE-2025-71282EXP
XenForo Path Disclosure via open_basedir Exceptions
Trending: 46
NONECVE-2026-35057EXP
XenForo Stored Cross-Site Scripting via Structured Text Mentions
Trending: 44
NONECVE-2026-35055EXP
XenForo Cross-Site Scripting via Lightbox in Posts
Trending: 37
NONECVE-2024-58342EXP
XenForo Open Redirect via getDynamicRedirect
Trending: 37

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 1, 2026
Discovered by ZDM
Apr 1, 2026
Updated: severity, affectedVersions, activelyExploited
Apr 1, 2026
Actively Exploited
Apr 1, 2026
Patch Available
Apr 1, 2026

Version History

v2
Last enriched 15h ago
v2Tier C15h ago

Updated severity to CRITICAL, affected versions to include 2.3.6, and marked as actively exploited.

severityaffectedVersionsactivelyExploited
via VulDB
v116h ago

Initial creation