Skip to content

XSS within PHP-FPM status endpoint

Moderate
iluuu1994 published GHSA-7qg2-v9fj-4mwv May 7, 2026

Package

PHP-FPM (PHP)

Affected versions

< 8.2.31
< 8.3.31
< 8.4.21
< 8.5.6

Patched versions

8.2.31
8.3.31
8.4.21
8.5.6

Description

Improper sanitization of the request URI within the PHP-FPM status page allows an attacker to execute arbitrary JavaScript code (XSS) on the victims machine, possibly stealing cookies on insufficiently hardened systems, or stealing other sensitive data such as the information from the status page itself. An attacker does not require authentication or access to the /status endpoint in order to trigger XSS, but may simply visit a URI embedding the malicious code.

  1. Navigate to example.com/<script>alert()</script>
  2. Navigate to example.com/status?full&html
  3. Observe the JavaScript pop-up.

The same is possible for the XML endpoint, possibly embedding malicious XML nodes into the status report.

  1. Navigate to example.com/<
  2. Navigate to example.com/status?full&xml
  3. Observe the XML parsing error.

Severity

Moderate

CVE ID

CVE-2026-6735

Weaknesses

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Learn more on MITRE.

Credits