Skip to main content

CVE-2024-23387: Cross-site scripting (XSS) in FusionPBX FusionPBX

Medium
VulnerabilityCVE-2024-23387cvecve-2024-23387
Published: Fri Jan 19 2024 (01/19/2024, 03:47:57 UTC)
Source: CVE Database V5
Vendor/Project: FusionPBX
Product: FusionPBX

Description

FusionPBX prior to 5.1.0 contains a cross-site scripting vulnerability. If this vulnerability is exploited by a remote authenticated attacker with an administrative privilege, an arbitrary script may be executed on the web browser of the user who is logging in to the product.

AI-Powered Analysis

AILast updated: 07/08/2025, 17:12:49 UTC

Technical Analysis

CVE-2024-23387 is a cross-site scripting (XSS) vulnerability identified in FusionPBX versions prior to 5.1.0. FusionPBX is an open-source, web-based graphical user interface for FreeSWITCH, widely used for managing telephony systems including VoIP. This vulnerability allows a remote attacker who has authenticated access with administrative privileges to inject arbitrary scripts into the web interface. When another user with administrative privileges logs into the system, the malicious script executes in their browser context. This type of vulnerability is classified under CWE-79, which involves improper neutralization of input leading to script injection. The CVSS v3.1 base score of 4.8 (medium severity) reflects that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), but needs high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss, as the attacker can potentially steal session cookies, perform actions on behalf of the administrator, or manipulate the web interface. However, availability is not impacted. No known exploits are currently reported in the wild, and no official patches are linked yet, though upgrading to version 5.1.0 or later is implied as a remediation step. The vulnerability requires an attacker to have administrative credentials, which limits the attack surface but still poses a significant risk in environments where multiple administrators access the system or where credential compromise is possible.

Potential Impact

For European organizations using FusionPBX, especially those managing critical telephony infrastructure, this vulnerability could lead to unauthorized administrative actions, data leakage, or further compromise of internal systems. Since FusionPBX is often deployed in enterprise VoIP environments, exploitation could disrupt communication services or enable attackers to intercept or manipulate call data. The requirement for administrative privileges means that insider threats or attackers who have already compromised an admin account could leverage this vulnerability to escalate their control. Confidentiality breaches could expose sensitive call logs or configuration details, while integrity violations could alter system settings or user permissions. Although availability is not directly affected, the indirect consequences of compromised administrative control could lead to service interruptions. Given the reliance on telephony systems in sectors such as finance, healthcare, and government across Europe, the impact could be significant if exploited in these contexts.

Mitigation Recommendations

European organizations should prioritize upgrading FusionPBX installations to version 5.1.0 or later, where this vulnerability is addressed. Until patches are applied, organizations should enforce strict access controls to limit administrative privileges only to trusted personnel and implement multi-factor authentication to reduce the risk of credential compromise. Regularly auditing administrative accounts and monitoring logs for unusual activity can help detect potential exploitation attempts. Additionally, employing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the FusionPBX interface can provide a layer of defense. Network segmentation to isolate telephony management interfaces from general user networks will reduce exposure. Security awareness training for administrators about phishing and credential security is also recommended to prevent initial account compromise. Finally, organizations should prepare incident response plans specific to telephony infrastructure compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2024-01-16T04:56:18.204Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b4360c

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 7/8/2025, 5:12:49 PM

Last updated: 8/15/2025, 2:08:54 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats