Vulnerabilites related to FreePBX - security-reporting
CVE-2025-55211 (GCVE-0-2025-55211)
Vulnerability from cvelistv5
Published
2025-09-15 21:00
Modified
2025-09-16 15:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
FreePBX is an open-source web-based graphical user interface. From 17.0.19.11 to before 17.0.21, authenticated users of the Administrator Control Panel (ACP) can run arbitrary shell commands by maliciously changing languages of the framework module. This vulnerability is fixed in 17.0.21.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreePBX/security-reporting/security/advisories/GHSA-xg83-m6q5-q24h | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FreePBX | security-reporting |
Version: >= 17.0.19.11, < 17.0.21 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-55211", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-16T15:44:06.389463Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-16T15:45:00.835Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-reporting", "vendor": "FreePBX", "versions": [ { "status": "affected", "version": "\u003e= 17.0.19.11, \u003c 17.0.21" } ] } ], "descriptions": [ { "lang": "en", "value": "FreePBX is an open-source web-based graphical user interface. From 17.0.19.11 to before 17.0.21, authenticated users of the Administrator Control Panel (ACP) can run arbitrary shell commands by maliciously changing languages of the framework module. This vulnerability is fixed in 17.0.21." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:L/U:Green", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-15T21:00:13.557Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreePBX/security-reporting/security/advisories/GHSA-xg83-m6q5-q24h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreePBX/security-reporting/security/advisories/GHSA-xg83-m6q5-q24h" } ], "source": { "advisory": "GHSA-xg83-m6q5-q24h", "discovery": "UNKNOWN" }, "title": "FreePBX Post-Authenticated Command Injection" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-55211", "datePublished": "2025-09-15T21:00:13.557Z", "dateReserved": "2025-08-08T21:55:07.966Z", "dateUpdated": "2025-09-16T15:45:00.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-57819 (GCVE-0-2025-57819)
Vulnerability from cvelistv5
Published
2025-08-28 16:45
Modified
2025-09-11 16:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FreePBX | security-reporting |
Version: < 15.0.66 Version: < 16.0.89 Version: < 17.0.3 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-57819", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-29T03:55:27.563332Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2025-08-29", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-57819" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-09-11T16:57:52.144Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/watchtowrlabs/watchTowr-vs-FreePBX-CVE-2025-57819" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-reporting", "vendor": "FreePBX", "versions": [ { "status": "affected", "version": "\u003c 15.0.66" }, { "status": "affected", "version": "\u003c 16.0.89" }, { "status": "affected", "version": "\u003c 17.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 10, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-288", "description": "CWE-288: Authentication Bypass Using an Alternate Path or Channel", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-28T16:45:18.749Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h" }, { "name": "https://community.freepbx.org/t/security-advisory-please-lock-down-your-administrator-access/107203", "tags": [ "x_refsource_MISC" ], "url": "https://community.freepbx.org/t/security-advisory-please-lock-down-your-administrator-access/107203" } ], "source": { "advisory": "GHSA-m42g-xg4c-5f3h", "discovery": "UNKNOWN" }, "title": "FreePBX Affected by Authentication Bypass Leading to SQL Injection and RCE" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-57819", "datePublished": "2025-08-28T16:45:18.749Z", "dateReserved": "2025-08-20T14:30:35.011Z", "dateUpdated": "2025-09-11T16:57:52.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47071 (GCVE-0-2024-47071)
Vulnerability from cvelistv5
Published
2024-10-01 15:40
Modified
2024-10-01 16:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
OSS Endpoint Manager is an endpoint manager module for FreePBX. OSS Endpoint Manager module activation can allow authenticated web users unauthorized access to read system files with the permissions of the webserver process. This vulnerability is fixed in 14.0.4.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FreePBX | security-reporting |
Version: < 14.0.4 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:freepbx:endpoint_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "endpoint_manager", "vendor": "freepbx", "versions": [ { "lessThan": "14.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-47071", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-01T16:09:36.724091Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T16:15:01.398Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-reporting", "vendor": "FreePBX", "versions": [ { "status": "affected", "version": "\u003c 14.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "OSS Endpoint Manager is an endpoint manager module for FreePBX. OSS Endpoint Manager module activation can allow authenticated web users unauthorized access to read system files with the permissions of the webserver process. This vulnerability is fixed in 14.0.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-01T15:40:46.257Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreePBX/security-reporting/security/advisories/GHSA-x9wc-qjrc-j7ww", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreePBX/security-reporting/security/advisories/GHSA-x9wc-qjrc-j7ww" }, { "name": "https://github.com/FreePBX-ContributedModules/endpointman/commit/bad70ca3de2166bbd24f273f7f212a8b2c92a719", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreePBX-ContributedModules/endpointman/commit/bad70ca3de2166bbd24f273f7f212a8b2c92a719" } ], "source": { "advisory": "GHSA-x9wc-qjrc-j7ww", "discovery": "UNKNOWN" }, "title": "OSS Endpoint Manager allows unauthorized access to read system files" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-47071", "datePublished": "2024-10-01T15:40:46.257Z", "dateReserved": "2024-09-17T17:42:37.029Z", "dateUpdated": "2024-10-01T16:15:01.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-55739 (GCVE-0-2025-55739)
Vulnerability from cvelistv5
Published
2025-09-04 23:22
Modified
2025-09-05 15:19
Severity ?
VLAI Severity ?
EPSS score ?
Summary
api is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk© (PBX). In versions lower than 15.0.13, 16.0.2 through 16.0.14, 17.0.1 and 17.0.2, there is an identical OAuth private key used across multiple systems that installed the same FreePBX RPM or DEB package. An attacker with access to the shared OAuth private key could forge JWT tokens, bypass authentication, and potentially gain full access to both REST and GraphQL APIs. Systems with the "api" module enabled, configured and previously activated by an administrator for remote inbound connections may be affected. This issue is fixed in versions 15.0.13, 16.0.15 and 17.0.3.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreePBX/security-reporting/security/advisories/GHSA-3r47-p39v-vqqf | x_refsource_CONFIRM | |
https://github.com/FreePBX/api/commit/305295aad38322c74cffd75bf550707dfb1a64a2 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FreePBX | security-reporting |
Version: < 15.0.13 Version: >= 16.0.2, < 16.0.15 Version: >= 17.0.1, < 17.0.3 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-55739", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-05T15:19:31.227831Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-05T15:19:50.135Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-reporting", "vendor": "FreePBX", "versions": [ { "status": "affected", "version": "\u003c 15.0.13" }, { "status": "affected", "version": "\u003e= 16.0.2, \u003c 16.0.15" }, { "status": "affected", "version": "\u003e= 17.0.1, \u003c 17.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "api is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk\u00a9 (PBX). In versions lower than 15.0.13, 16.0.2 through 16.0.14, 17.0.1 and 17.0.2, there is an identical OAuth private key used across multiple systems that installed the same FreePBX RPM or DEB package. An attacker with access to the shared OAuth private key could forge JWT tokens, bypass authentication, and potentially gain full access to both REST and GraphQL APIs. Systems with the \"api\" module enabled, configured and previously activated by an administrator for remote inbound connections may be affected. This issue is fixed in versions 15.0.13, 16.0.15 and 17.0.3." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.1, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798: Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522: Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-04T23:22:43.649Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreePBX/security-reporting/security/advisories/GHSA-3r47-p39v-vqqf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreePBX/security-reporting/security/advisories/GHSA-3r47-p39v-vqqf" }, { "name": "https://github.com/FreePBX/api/commit/305295aad38322c74cffd75bf550707dfb1a64a2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreePBX/api/commit/305295aad38322c74cffd75bf550707dfb1a64a2" } ], "source": { "advisory": "GHSA-3r47-p39v-vqqf", "discovery": "UNKNOWN" }, "title": "api: Shared OAuth Signing Key Between Different Instances" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-55739", "datePublished": "2025-09-04T23:22:43.649Z", "dateReserved": "2025-08-14T22:31:17.683Z", "dateUpdated": "2025-09-05T15:19:50.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-59056 (GCVE-0-2025-59056)
Vulnerability from cvelistv5
Published
2025-09-15 21:04
Modified
2025-09-16 15:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
FreePBX is an open-source web-based graphical user interface. In FreePBX 15, 16, and 17, malicious connections to the Administrator Control Panel web interface can cause the uninstall function to be triggered for certain modules. This function drops the module's database tables, which is where most modules store their configuration. This vulnerability is fixed in 15.0.38, 16.0.41, and 17.0.21.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreePBX/security-reporting/security/advisories/GHSA-frc2-jhgg-rwpr | x_refsource_CONFIRM | |
https://github.com/FreePBX/framework/blame/release/17.0/amp_conf/htdocs/admin/ajax.php#L18 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FreePBX | security-reporting |
Version: < 15.0.38 Version: >= 16.0.0, < 16.0.41 Version: >= 17.0.0, < 17.0.21 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-59056", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-16T15:42:21.509704Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-16T15:42:30.971Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-reporting", "vendor": "FreePBX", "versions": [ { "status": "affected", "version": "\u003c 15.0.38" }, { "status": "affected", "version": "\u003e= 16.0.0, \u003c 16.0.41" }, { "status": "affected", "version": "\u003e= 17.0.0, \u003c 17.0.21" } ] } ], "descriptions": [ { "lang": "en", "value": "FreePBX is an open-source web-based graphical user interface. In FreePBX 15, 16, and 17, malicious connections to the Administrator Control Panel web interface can cause the uninstall function to be triggered for certain modules. This function drops the module\u0027s database tables, which is where most modules store their configuration. This vulnerability is fixed in 15.0.38, 16.0.41, and 17.0.21." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.6, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:U/V:D/RE:L/U:Red", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-15T21:04:07.875Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreePBX/security-reporting/security/advisories/GHSA-frc2-jhgg-rwpr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreePBX/security-reporting/security/advisories/GHSA-frc2-jhgg-rwpr" }, { "name": "https://github.com/FreePBX/framework/blame/release/17.0/amp_conf/htdocs/admin/ajax.php#L18", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreePBX/framework/blame/release/17.0/amp_conf/htdocs/admin/ajax.php#L18" } ], "source": { "advisory": "GHSA-frc2-jhgg-rwpr", "discovery": "UNKNOWN" }, "title": "FreePBX vulnerable to unauthenticated Denial of Service" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-59056", "datePublished": "2025-09-15T21:04:07.875Z", "dateReserved": "2025-09-08T16:19:26.173Z", "dateUpdated": "2025-09-16T15:42:30.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-55209 (GCVE-0-2025-55209)
Vulnerability from cvelistv5
Published
2025-09-04 22:50
Modified
2025-09-05 15:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
contactmanager is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk© (PBX). In versions 15.0.14 and below, 16.0.0 through 16.0.26.4 and 17.0.0 through 17.0.5, a stored cross-site scripting (XSS) vulnerability in FreePBX allows a low-privileged User Control Panel (UCP) user to inject malicious JavaScript into the system. The malicious code executes in the context of an administrator when they interact with the affected component, leading to session hijacking and potential privilege escalation. This issue is fixed in versions 15.0.14, 16.0.27 and 17.0.6.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreePBX/security-reporting/security/advisories/GHSA-j654-x3q2-6wm3 | x_refsource_CONFIRM | |
https://github.com/FreePBX/contactmanager/commit/55abba0f1ab5d66ba87732fd06179231d1f68184 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FreePBX | security-reporting |
Version: < 15.0.14 Version: >= 16.0.0, < 16.0.27 Version: >= 17.0.0, < 17.0.6 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-55209", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-05T15:47:26.900264Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-05T15:47:36.235Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-reporting", "vendor": "FreePBX", "versions": [ { "status": "affected", "version": "\u003c 15.0.14" }, { "status": "affected", "version": "\u003e= 16.0.0, \u003c 16.0.27" }, { "status": "affected", "version": "\u003e= 17.0.0, \u003c 17.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "contactmanager is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk\u00a9 (PBX). In versions 15.0.14 and below, 16.0.0 through 16.0.26.4 and 17.0.0 through 17.0.5, a stored cross-site scripting (XSS) vulnerability in FreePBX allows a low-privileged User Control Panel (UCP) user to inject malicious JavaScript into the system. The malicious code executes in the context of an administrator when they interact with the affected component, leading to session hijacking and potential privilege escalation. This issue is fixed in versions 15.0.14, 16.0.27 and 17.0.6." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.1, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-04T22:50:59.946Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreePBX/security-reporting/security/advisories/GHSA-j654-x3q2-6wm3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreePBX/security-reporting/security/advisories/GHSA-j654-x3q2-6wm3" }, { "name": "https://github.com/FreePBX/contactmanager/commit/55abba0f1ab5d66ba87732fd06179231d1f68184", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreePBX/contactmanager/commit/55abba0f1ab5d66ba87732fd06179231d1f68184" } ], "source": { "advisory": "GHSA-j654-x3q2-6wm3", "discovery": "UNKNOWN" }, "title": "FreePBX UCP is Vulnerable to Stored XSS Through its User Control Panel" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-55209", "datePublished": "2025-09-04T22:50:59.946Z", "dateReserved": "2025-08-08T21:55:07.966Z", "dateUpdated": "2025-09-05T15:47:36.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }