CVE-2025-2292: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Xorcom CompletePBX
Xorcom CompletePBX is vulnerable to an authenticated path traversal, allowing for arbitrary file reads via the Backup and Restore functionality.This issue affects CompletePBX: through 5.2.35.
AI Analysis
Technical Summary
CVE-2025-2292 is a path traversal vulnerability classified under CWE-22 affecting Xorcom CompletePBX, a telephony PBX system widely used for VoIP communications. The flaw exists in the Backup and Restore functionality, which improperly restricts pathname inputs, allowing an authenticated attacker to traverse directories outside the intended backup scope. By manipulating file paths, the attacker can read arbitrary files on the underlying operating system, potentially exposing sensitive configuration files, credentials, or other critical data. The vulnerability requires the attacker to have valid user credentials (low privilege), but no further user interaction is needed. The CVSS 3.1 score of 6.5 reflects the network attack vector, low attack complexity, and high confidentiality impact, with no effect on integrity or availability. No public exploits or patches are currently available, indicating a window of exposure. The vulnerability affects CompletePBX versions through 5.2.35, and the issue was publicly disclosed on March 31, 2025. Given the nature of PBX systems as critical communication infrastructure, unauthorized file disclosure could lead to further compromise or data leakage.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality of sensitive telephony system data, including configuration files, user credentials, and call records. Exposure of such data could facilitate further attacks such as privilege escalation, eavesdropping, or disruption of communications. Organizations in sectors relying heavily on secure communications—such as finance, government, healthcare, and critical infrastructure—may face operational and reputational damage if exploited. Since the vulnerability requires authentication, insider threats or compromised user accounts increase risk. The lack of patches and known exploits means organizations must act proactively. The impact is heightened in environments where CompletePBX is integrated with other critical systems or where regulatory compliance mandates strict data protection.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the Backup and Restore functionality to only highly trusted administrators and monitoring all backup-related activities for anomalies. Implement strict authentication and authorization controls, including multi-factor authentication, to reduce risk from compromised credentials. Network segmentation should isolate PBX systems from general user networks to limit exposure. Regularly audit user accounts and permissions to ensure minimal necessary access. Until a patch is available, consider disabling the Backup and Restore feature if feasible or using compensating controls such as file integrity monitoring on PBX systems. Maintain up-to-date backups stored securely offline to enable recovery if exploitation occurs. Stay informed on vendor advisories for patch releases and apply updates promptly once available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-2292: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Xorcom CompletePBX
Description
Xorcom CompletePBX is vulnerable to an authenticated path traversal, allowing for arbitrary file reads via the Backup and Restore functionality.This issue affects CompletePBX: through 5.2.35.
AI-Powered Analysis
Technical Analysis
CVE-2025-2292 is a path traversal vulnerability classified under CWE-22 affecting Xorcom CompletePBX, a telephony PBX system widely used for VoIP communications. The flaw exists in the Backup and Restore functionality, which improperly restricts pathname inputs, allowing an authenticated attacker to traverse directories outside the intended backup scope. By manipulating file paths, the attacker can read arbitrary files on the underlying operating system, potentially exposing sensitive configuration files, credentials, or other critical data. The vulnerability requires the attacker to have valid user credentials (low privilege), but no further user interaction is needed. The CVSS 3.1 score of 6.5 reflects the network attack vector, low attack complexity, and high confidentiality impact, with no effect on integrity or availability. No public exploits or patches are currently available, indicating a window of exposure. The vulnerability affects CompletePBX versions through 5.2.35, and the issue was publicly disclosed on March 31, 2025. Given the nature of PBX systems as critical communication infrastructure, unauthorized file disclosure could lead to further compromise or data leakage.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality of sensitive telephony system data, including configuration files, user credentials, and call records. Exposure of such data could facilitate further attacks such as privilege escalation, eavesdropping, or disruption of communications. Organizations in sectors relying heavily on secure communications—such as finance, government, healthcare, and critical infrastructure—may face operational and reputational damage if exploited. Since the vulnerability requires authentication, insider threats or compromised user accounts increase risk. The lack of patches and known exploits means organizations must act proactively. The impact is heightened in environments where CompletePBX is integrated with other critical systems or where regulatory compliance mandates strict data protection.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the Backup and Restore functionality to only highly trusted administrators and monitoring all backup-related activities for anomalies. Implement strict authentication and authorization controls, including multi-factor authentication, to reduce risk from compromised credentials. Network segmentation should isolate PBX systems from general user networks to limit exposure. Regularly audit user accounts and permissions to ensure minimal necessary access. Until a patch is available, consider disabling the Backup and Restore feature if feasible or using compensating controls such as file integrity monitoring on PBX systems. Maintain up-to-date backups stored securely offline to enable recovery if exploitation occurs. Stay informed on vendor advisories for patch releases and apply updates promptly once available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-03-13T17:27:11.980Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6929c5924121026312b3ca54
Added to database: 11/28/2025, 3:53:54 PM
Last enriched: 12/31/2025, 12:08:49 AM
Last updated: 1/13/2026, 9:12:52 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Cyber Fraud Overtakes Ransomware as Top CEO Concern: WEF
MediumCVE-2025-41717: CWE-94 Improper Control of Generation of Code ('Code Injection') in Phoenix Contact TC ROUTER 3002T-3G
HighCVE-2025-14829: CWE-862 Missing Authorization in E-xact | Hosted Payment |
CriticalCVE-2025-10915: CWE-862 Missing Authorization in Dreamer Blog
HighCVE-2026-22837
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.