CVE-2015-10141
Severity CVSS v4.0:
CRITICAL
Type:
CWE-78
OS Command Injections
Publication date:
23/07/2025
Last modified:
25/07/2025
Description
An unauthenticated OS command injection vulnerability exists within Xdebug versions 2.5.5 and earlier, a PHP debugging extension developed by Derick Rethans. When remote debugging is enabled, Xdebug listens on port 9000 and accepts debugger protocol commands without authentication. An attacker can send a crafted eval command over this interface to execute arbitrary PHP code, which may invoke system-level functions such as system() or passthru(). This results in full compromise of the host under the privileges of the web server user.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
References to Advisories, Solutions, and Tools
- http://web.archive.org/web/20231226215418/https://paper.seebug.org/397/
- https://kirtixs.com/blog/2015/11/13/xpwn-exploiting-xdebug-enabled-servers/
- https://www.exploit-db.com/exploits/44568
- https://www.fortiguard.com/encyclopedia/ips/46000
- https://www.vulncheck.com/advisories/xdebug-remote-debugger-unauth-os-command-execution
- https://xdebug.org/



