CVE-2025-30006: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Xorcom CompletePBX
CVE-2025-30006 is a reflected cross-site scripting (XSS) vulnerability in the administrative control panel of Xorcom CompletePBX versions prior to 5. 2. 35. This vulnerability allows unauthenticated remote attackers to inject malicious scripts via crafted input that is improperly neutralized during web page generation. Exploitation requires user interaction but no prior authentication, and can lead to partial compromise of confidentiality and integrity within the affected system's administrative interface. The vulnerability has a CVSS 3. 1 base score of 6. 1 (medium severity) with network attack vector, low attack complexity, no privileges required, and user interaction needed. No known public exploits or patches are currently available. European organizations using CompletePBX, especially in countries with significant VoIP deployments, should prioritize mitigation to prevent potential targeted attacks.
AI Analysis
Technical Summary
CVE-2025-30006 is a reflected cross-site scripting (XSS) vulnerability identified in the administrative control panel of Xorcom CompletePBX, a VoIP PBX system widely used for telephony management. The vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the affected versions up to but not including 5.2.35 fail to adequately sanitize input parameters, allowing an attacker to craft malicious URLs or payloads that, when visited by an administrative user, execute arbitrary JavaScript code in the context of the administrative interface. This can lead to theft of session tokens, manipulation of administrative functions, or redirection to malicious sites. The attack vector is remote and network-based, requiring no authentication but necessitating user interaction (clicking a malicious link). The vulnerability impacts confidentiality and integrity but does not affect availability. The CVSS 3.1 score of 6.1 reflects a medium severity level due to the ease of exploitation and potential impact on sensitive administrative functions. No public exploits or patches have been reported at the time of disclosure, indicating a window of exposure for affected users. The vulnerability's scope is limited to the administrative control panel, which is typically accessed by a restricted set of users, but successful exploitation could lead to significant compromise of the PBX system and downstream telephony infrastructure.
Potential Impact
For European organizations, the impact of CVE-2025-30006 can be significant, particularly for those relying on Xorcom CompletePBX for critical telephony services. Exploitation could allow attackers to hijack administrative sessions, manipulate call routing, intercept or redirect calls, and potentially gain footholds for further network intrusion. Confidentiality of administrative credentials and session tokens is at risk, which could lead to unauthorized access to sensitive telephony configurations and user data. Integrity of the PBX configuration may be compromised, affecting business communications and potentially causing operational disruptions. Although availability is not directly impacted, the indirect effects of compromised telephony systems can disrupt business continuity. European organizations in sectors such as finance, healthcare, and government, which rely heavily on secure communications, are particularly vulnerable. The lack of known exploits reduces immediate risk but also means organizations must proactively address the vulnerability before attackers develop weaponized exploits.
Mitigation Recommendations
To mitigate CVE-2025-30006, organizations should implement the following specific measures: 1) Immediately restrict access to the CompletePBX administrative control panel using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted administrators only. 2) Employ web application firewalls (WAFs) with rules designed to detect and block reflected XSS attack patterns targeting the administrative interface. 3) Encourage administrators to avoid clicking on untrusted links and educate them about phishing risks associated with XSS attacks. 4) Implement Content Security Policy (CSP) headers on the administrative interface to restrict the execution of unauthorized scripts. 5) Monitor administrative access logs for unusual activity or repeated suspicious requests that may indicate exploitation attempts. 6) Coordinate with Xorcom for timely patch deployment once available, and test updates in a controlled environment before production rollout. 7) Consider deploying multi-factor authentication (MFA) for administrative access to reduce the impact of stolen session tokens. 8) Regularly audit and update the PBX system and related infrastructure to minimize exposure to known vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-30006: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Xorcom CompletePBX
Description
CVE-2025-30006 is a reflected cross-site scripting (XSS) vulnerability in the administrative control panel of Xorcom CompletePBX versions prior to 5. 2. 35. This vulnerability allows unauthenticated remote attackers to inject malicious scripts via crafted input that is improperly neutralized during web page generation. Exploitation requires user interaction but no prior authentication, and can lead to partial compromise of confidentiality and integrity within the affected system's administrative interface. The vulnerability has a CVSS 3. 1 base score of 6. 1 (medium severity) with network attack vector, low attack complexity, no privileges required, and user interaction needed. No known public exploits or patches are currently available. European organizations using CompletePBX, especially in countries with significant VoIP deployments, should prioritize mitigation to prevent potential targeted attacks.
AI-Powered Analysis
Technical Analysis
CVE-2025-30006 is a reflected cross-site scripting (XSS) vulnerability identified in the administrative control panel of Xorcom CompletePBX, a VoIP PBX system widely used for telephony management. The vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the affected versions up to but not including 5.2.35 fail to adequately sanitize input parameters, allowing an attacker to craft malicious URLs or payloads that, when visited by an administrative user, execute arbitrary JavaScript code in the context of the administrative interface. This can lead to theft of session tokens, manipulation of administrative functions, or redirection to malicious sites. The attack vector is remote and network-based, requiring no authentication but necessitating user interaction (clicking a malicious link). The vulnerability impacts confidentiality and integrity but does not affect availability. The CVSS 3.1 score of 6.1 reflects a medium severity level due to the ease of exploitation and potential impact on sensitive administrative functions. No public exploits or patches have been reported at the time of disclosure, indicating a window of exposure for affected users. The vulnerability's scope is limited to the administrative control panel, which is typically accessed by a restricted set of users, but successful exploitation could lead to significant compromise of the PBX system and downstream telephony infrastructure.
Potential Impact
For European organizations, the impact of CVE-2025-30006 can be significant, particularly for those relying on Xorcom CompletePBX for critical telephony services. Exploitation could allow attackers to hijack administrative sessions, manipulate call routing, intercept or redirect calls, and potentially gain footholds for further network intrusion. Confidentiality of administrative credentials and session tokens is at risk, which could lead to unauthorized access to sensitive telephony configurations and user data. Integrity of the PBX configuration may be compromised, affecting business communications and potentially causing operational disruptions. Although availability is not directly impacted, the indirect effects of compromised telephony systems can disrupt business continuity. European organizations in sectors such as finance, healthcare, and government, which rely heavily on secure communications, are particularly vulnerable. The lack of known exploits reduces immediate risk but also means organizations must proactively address the vulnerability before attackers develop weaponized exploits.
Mitigation Recommendations
To mitigate CVE-2025-30006, organizations should implement the following specific measures: 1) Immediately restrict access to the CompletePBX administrative control panel using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted administrators only. 2) Employ web application firewalls (WAFs) with rules designed to detect and block reflected XSS attack patterns targeting the administrative interface. 3) Encourage administrators to avoid clicking on untrusted links and educate them about phishing risks associated with XSS attacks. 4) Implement Content Security Policy (CSP) headers on the administrative interface to restrict the execution of unauthorized scripts. 5) Monitor administrative access logs for unusual activity or repeated suspicious requests that may indicate exploitation attempts. 6) Coordinate with Xorcom for timely patch deployment once available, and test updates in a controlled environment before production rollout. 7) Consider deploying multi-factor authentication (MFA) for administrative access to reduce the impact of stolen session tokens. 8) Regularly audit and update the PBX system and related infrastructure to minimize exposure to known vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-03-13T17:27:08.113Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6929c5924121026312b3ca60
Added to database: 11/28/2025, 3:53:54 PM
Last enriched: 11/28/2025, 4:09:10 PM
Last updated: 11/28/2025, 4:58:19 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-23683
HighCVE-2024-23682: CWE-501 Trust Boundary Violation
HighCVE-2024-21908: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
MediumCVE-2023-30802: CWE-540: Inclusion of Sensitive Information in Source Code in Sangfor Net-Gen Application Firewall
MediumCVE-2025-12183: CWE-125 Out-of-bounds Read
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.