CVE-2015-10141
Publication date 23 July 2025
Last updated 23 July 2025
Ubuntu priority
Description
An unauthenticated OS command injection vulnerability exists within Xdebug versions 2.5.5 and earlier, a PHP debugging extension developed by Derick Rethans. When remote debugging is enabled, Xdebug listens on port 9000 and accepts debugger protocol commands without authentication. An attacker can send a crafted eval command over this interface to execute arbitrary PHP code, which may invoke system-level functions such as system() or passthru(). This results in full compromise of the host under the privileges of the web server user.
Status
Package | Ubuntu Release | Status |
---|---|---|
xdebug | 25.10 questing |
Needs evaluation
|
25.04 plucky |
Needs evaluation
|
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2015-10141
- http://web.archive.org/web/20231226215418/https://paper.seebug.org/397/
- https://kirtixs.com/blog/2015/11/13/xpwn-exploiting-xdebug-enabled-servers/
- https://www.exploit-db.com/exploits/44568
- https://www.fortiguard.com/encyclopedia/ips/46000
- https://www.vulncheck.com/advisories/xdebug-remote-debugger-unauth-os-command-execution
- https://xdebug.org/