I made some manual changes to a XenForo file to see what the paths look like in the error output: Code: An exception occurred: Undefined variable: test1 in /home/vw/public_html/xf/library/XenForo/ViewPublic/Forum/List.php on line 17 1. XenForo_Application::handlePhpError() in XenForo/ViewPublic/Forum/List.php at line 17 2. XenForo_ViewPublic_Forum_List->renderHtml() in /home/vw/edge/upload/library/vw/XenForo/ViewPublic/Forum/List.php at line 66 3. vw_XenForo_ViewPublic_Forum_List->renderHtml() in XenForo/ViewRenderer/Abstract.php at line 227 4. XenForo_ViewRenderer_Abstract->renderViewObject() in XenForo/ViewRenderer/HtmlPublic.php at line 71 5. XenForo_ViewRenderer_HtmlPublic->renderView() in XenForo/FrontController.php at line 604 6. XenForo_FrontController->renderView() in XenForo/FrontController.php at line 158 7. XenForo_FrontController->run() in /home/vw/public_html/xf/index.php at line 13 This appears consistent with what I believed would happen after reviewing the code of XenForo_Error. But unfortunately, as you can see, a number of absolute paths appear with the user's account name. This is a vulnerability type referred to as Full Path Disclosure (FPD), which makes other types of attacks easier, because the account name is revealed. In the current implementation, XenForo only hides the path to library/ files. As you can see in trace #7, the file that started the request (index.php) still shows the full path. Also, in trace #2, an add-on that allowed me to specify the path where I keep its files (outsite XenForo's library dir) also has the path revealed. Apparently there is no way to notify XenForo's error handler of other paths. While some argue that FPD is a server misconfiguration (such as XenForo's debug mode being turned on in production), many counter that if there is an opportunity to prevent that at the software level, that should also be done. I believe XenForo is in the second camp, because it bothers to hide the /library path already, and it provides .htaccess files for /library to prevent fatal errors when visiting the files directly. Still, here is one blog's discussion of FPD: http://blog.dewhurstsecurity.com/2011/10/05/full-path-disclosure-fpd.html Aside from Parse Errors and Fatal Errors, this vulnerability can be largely avoided in XenForo by making the following changes: Allow include paths to be registered with XenForo_Error. Something like: Code: XenForo_Error::add_path('/hide/this/custom/path', '[replace it with this]') Then, when the error handler is called, replace all the registered paths with the replacement strings. Register both the CWD and the library directory. Register any other paths you can customize in config.php. Note also that even though the front-end currently hides some paths, the Server Error Logs page in the AdminCP hides none. I foresee there are many cases where the server administrator doesn't give a forum admin FTP access and would prefer that admins not know the full path. You hide passwords and auth tokens from these logs, so why not the absolute path too? EDIT: I think I will also be taking this up with the developers of PHP, because leaks via the default error handlers (the error text of parse and fatal errors are not changeable and are not affected by include_path) contributes to a culture among PHP developers that diminishes the importance of full-path disclosures.