We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An unauthenticated OS command injection vulnerability exists within Xdebug versions 2.5.5 and earlier, a PHP debugging extension developed by Derick Rethans. When remote debugging is enabled, Xdebug listens on port 9000 and accepts debugger protocol commands without authentication. An attacker can send a crafted eval command over this interface to execute arbitrary PHP code, which may invoke system-level functions such as system() or passthru(). This results in full compromise of the host under the privileges of the web server user.
Reserved 2025-07-22 | Published 2025-07-23 | Updated 2025-07-23 | Assigner VulnCheckCWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-306 Missing Authentication for Critical Function
Ricter Zheng
xdebug.org/
kirtixs.com/...11/13/xpwn-exploiting-xdebug-enabled-servers/
web.archive.org/...31226215418/https://paper.seebug.org/397/
www.exploit-db.com/exploits/44568
www.fortiguard.com/encyclopedia/ips/46000
www.vulncheck.com/...te-debugger-unauth-os-command-execution
Support options