Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2292: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Xorcom CompletePBX

0
Medium
VulnerabilityCVE-2025-2292cvecve-2025-2292cwe-22
Published: Mon Mar 31 2025 (03/31/2025, 16:38:05 UTC)
Source: CVE Database V5
Vendor/Project: Xorcom
Product: CompletePBX

Description

Xorcom CompletePBX is vulnerable to an authenticated path traversal, allowing for arbitrary file reads via the Backup and Restore functionality.This issue affects CompletePBX: through 5.2.35.

AI-Powered Analysis

AILast updated: 12/31/2025, 00:08:49 UTC

Technical Analysis

CVE-2025-2292 is a path traversal vulnerability classified under CWE-22 affecting Xorcom CompletePBX, a telephony PBX system widely used for VoIP communications. The flaw exists in the Backup and Restore functionality, which improperly restricts pathname inputs, allowing an authenticated attacker to traverse directories outside the intended backup scope. By manipulating file paths, the attacker can read arbitrary files on the underlying operating system, potentially exposing sensitive configuration files, credentials, or other critical data. The vulnerability requires the attacker to have valid user credentials (low privilege), but no further user interaction is needed. The CVSS 3.1 score of 6.5 reflects the network attack vector, low attack complexity, and high confidentiality impact, with no effect on integrity or availability. No public exploits or patches are currently available, indicating a window of exposure. The vulnerability affects CompletePBX versions through 5.2.35, and the issue was publicly disclosed on March 31, 2025. Given the nature of PBX systems as critical communication infrastructure, unauthorized file disclosure could lead to further compromise or data leakage.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality of sensitive telephony system data, including configuration files, user credentials, and call records. Exposure of such data could facilitate further attacks such as privilege escalation, eavesdropping, or disruption of communications. Organizations in sectors relying heavily on secure communications—such as finance, government, healthcare, and critical infrastructure—may face operational and reputational damage if exploited. Since the vulnerability requires authentication, insider threats or compromised user accounts increase risk. The lack of patches and known exploits means organizations must act proactively. The impact is heightened in environments where CompletePBX is integrated with other critical systems or where regulatory compliance mandates strict data protection.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the Backup and Restore functionality to only highly trusted administrators and monitoring all backup-related activities for anomalies. Implement strict authentication and authorization controls, including multi-factor authentication, to reduce risk from compromised credentials. Network segmentation should isolate PBX systems from general user networks to limit exposure. Regularly audit user accounts and permissions to ensure minimal necessary access. Until a patch is available, consider disabling the Backup and Restore feature if feasible or using compensating controls such as file integrity monitoring on PBX systems. Maintain up-to-date backups stored securely offline to enable recovery if exploitation occurs. Stay informed on vendor advisories for patch releases and apply updates promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-03-13T17:27:11.980Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6929c5924121026312b3ca54

Added to database: 11/28/2025, 3:53:54 PM

Last enriched: 12/31/2025, 12:08:49 AM

Last updated: 1/13/2026, 9:12:52 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats