CVE-2005-1921
PHP Xml Rpc < 1.3.0 - Code Injection
Title source: ruleDescription
Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
Exploits (6)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubywebappsphp
https://www.exploit-db.com/exploits/16882
exploitdb
WORKING POC
VERIFIED
by Mike Rifone · perlwebappsphp
https://www.exploit-db.com/exploits/1084
exploitdb
WORKING POC
by GulfTech Security · textwebappsphp
https://www.exploit-db.com/exploits/43829
metasploit
WORKING POC
EXCELLENT
by hdm, cazz · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/php_xmlrpc_eval.rb
References (50)
... and 30 more
Scores
EPSS
0.8615
EPSS Percentile
99.4%
Details
CWE
CWE-94
Status
published
Products (5)
debian/debian_linux
3.1
drupal/drupal
< 4.5.4
gggeek/phpxmlrpc
< 1.1
php/xml_rpc
< 1.3.0
tiki/tikiwiki_cms\/groupware
< 1.8.5
Published
Jul 05, 2005
Tracked Since
Feb 18, 2026