CVE-2005-1921

PHP Xml Rpc < 1.3.0 - Code Injection

Title source: rule

Description

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

Exploits (6)

exploitdb WORKING POC VERIFIED
by Metasploit · rubywebappsphp
https://www.exploit-db.com/exploits/16882
exploitdb WORKING POC VERIFIED
by Mike Rifone · perlwebappsphp
https://www.exploit-db.com/exploits/1084
exploitdb WORKING POC VERIFIED
by dukenn · perlwebappsphp
https://www.exploit-db.com/exploits/1083
exploitdb WORKING POC
by GulfTech Security · textwebappsphp
https://www.exploit-db.com/exploits/43829
exploitdb WORKING POC
perlwebappsphp
https://www.exploit-db.com/exploits/1078
metasploit WORKING POC EXCELLENT
by hdm, cazz · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/php_xmlrpc_eval.rb

Scores

EPSS 0.8615
EPSS Percentile 99.4%

Details

CWE
CWE-94
Status published
Products (5)
debian/debian_linux 3.1
drupal/drupal < 4.5.4
gggeek/phpxmlrpc < 1.1
php/xml_rpc < 1.3.0
tiki/tikiwiki_cms\/groupware < 1.8.5
Published Jul 05, 2005
Tracked Since Feb 18, 2026