Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55211: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in FreePBX framework

0
Medium
VulnerabilityCVE-2025-55211cvecve-2025-55211cwe-78
Published: Mon Sep 15 2025 (09/15/2025, 21:00:13 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: framework

Description

FreePBX is an open-source web-based graphical user interface. From 17.0.19.11 to before 17.0.21, authenticated users of the Administrator Control Panel (ACP) can run arbitrary shell commands by maliciously changing languages of the framework module. This vulnerability is fixed in 17.0.21.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 07:13:13 UTC

Technical Analysis

CVE-2025-55211 is a medium-severity OS command injection vulnerability affecting the FreePBX framework, an open-source web-based GUI widely used for managing Asterisk PBX systems. The vulnerability exists in versions from 17.0.19.11 up to but not including 17.0.21. It arises due to improper neutralization of special elements in the language configuration functionality within the Administrator Control Panel (ACP). Authenticated users with ACP access can manipulate the language settings to inject and execute arbitrary shell commands on the underlying operating system. This flaw leverages CWE-78, indicating that input is not properly sanitized before being passed to system-level commands. Exploitation does not require user interaction beyond authentication and can lead to full compromise of the PBX server, potentially exposing sensitive call data, enabling eavesdropping, or allowing attackers to pivot into internal networks. The vulnerability has a CVSS 4.0 score of 6.3, reflecting network attack vector, low attack complexity, no privileges required beyond ACP access, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as arbitrary command execution can lead to data theft, system manipulation, and denial of service. The issue was publicly disclosed on September 15, 2025, and fixed in FreePBX framework version 17.0.21. No public exploits have been reported yet, but the presence of this vulnerability in a critical telephony infrastructure component makes it a significant risk.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to telephony infrastructure security. FreePBX is widely deployed across enterprises, service providers, and government agencies in Europe for managing VoIP communications. Exploitation could lead to unauthorized access to call records, interception of communications, and disruption of telephony services, impacting business continuity and privacy compliance (e.g., GDPR). Attackers gaining shell access could also move laterally within networks, compromising other critical systems. The medium severity rating may understate the real-world impact given the critical nature of PBX systems in many organizations. Additionally, the vulnerability requires only authenticated ACP access, which could be obtained via credential theft or phishing, increasing the attack surface. The lack of known exploits currently provides a window for mitigation, but the risk of future exploitation remains high. Organizations in sectors such as finance, healthcare, and government, which rely heavily on secure communications, are particularly vulnerable to operational and reputational damage.

Mitigation Recommendations

European organizations should immediately verify their FreePBX framework version and upgrade to version 17.0.21 or later to remediate this vulnerability. If immediate patching is not feasible, restrict access to the Administrator Control Panel using network segmentation, VPNs, or IP whitelisting to limit exposure to trusted personnel only. Implement strong multi-factor authentication (MFA) for ACP access to reduce the risk of credential compromise. Conduct regular audits of user accounts and access logs to detect suspicious activities related to language settings changes or shell command executions. Employ host-based intrusion detection systems (HIDS) to monitor for unusual command executions on PBX servers. Additionally, consider deploying web application firewalls (WAFs) with custom rules to detect and block command injection attempts targeting the language configuration endpoints. Finally, ensure that backup and incident response plans include scenarios involving PBX compromise to enable rapid recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-08T21:55:07.966Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c8aa71ee2781683eebd7fa

Added to database: 9/16/2025, 12:08:17 AM

Last enriched: 2/14/2026, 7:13:13 AM

Last updated: 3/22/2026, 5:42:03 PM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses