CVE-2025-55739: CWE-798: Use of Hard-coded Credentials in FreePBX security-reporting
api is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk© (PBX). In versions lower than 15.0.13, 16.0.2 through 16.0.14, 17.0.1 and 17.0.2, there is an identical OAuth private key used across multiple systems that installed the same FreePBX RPM or DEB package. An attacker with access to the shared OAuth private key could forge JWT tokens, bypass authentication, and potentially gain full access to both REST and GraphQL APIs. Systems with the "api" module enabled, configured and previously activated by an administrator for remote inbound connections may be affected. This issue is fixed in versions 15.0.13, 16.0.15 and 17.0.3.
AI Analysis
Technical Summary
CVE-2025-55739 is a medium-severity vulnerability affecting the 'api' module of FreePBX, an open-source GUI used to manage Asterisk PBX systems. The vulnerability arises from the use of a hard-coded OAuth private key that is identical across multiple installations of FreePBX RPM or DEB packages in affected versions: all versions below 15.0.13, versions from 16.0.2 up to but not including 16.0.15, and versions 17.0.1 and 17.0.2. This shared private key enables an attacker who obtains it to forge JSON Web Tokens (JWTs), thereby bypassing authentication mechanisms. With forged JWTs, the attacker can gain unauthorized full access to both REST and GraphQL APIs exposed by the FreePBX system. This is particularly critical for systems where the 'api' module is enabled, configured, and previously activated by an administrator for remote inbound connections. The vulnerability stems from CWE-798 (Use of Hard-coded Credentials) and CWE-522 (Insufficiently Protected Credentials). The issue has been addressed in FreePBX versions 15.0.13, 16.0.15, and 17.0.3. The CVSS v4.0 base score is 5.1, reflecting a medium severity level, with attack vector being network-based, low attack complexity, no privileges required, but user interaction needed, and limited impact on confidentiality, integrity, and availability. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using FreePBX systems with the vulnerable 'api' module enabled and exposed to remote inbound connections, this vulnerability poses a significant risk. An attacker exploiting this flaw can bypass authentication controls and gain full API access, potentially allowing them to manipulate telephony configurations, intercept or redirect calls, access sensitive call data, or disrupt PBX services. Such unauthorized access could lead to data breaches involving call logs or customer information, service outages impacting business communications, and potential financial fraud or espionage. Given the critical role of PBX systems in enterprise telephony infrastructure, exploitation could disrupt business operations and damage organizational reputation. The medium CVSS score suggests moderate risk, but the ease of exploitation (no privileges required) and the potential for full API control elevate the threat level. European organizations in sectors relying heavily on telephony, such as finance, healthcare, and government, may face heightened risks. Additionally, organizations with remote-accessible FreePBX APIs are particularly vulnerable, emphasizing the need for immediate remediation.
Mitigation Recommendations
1. Immediate upgrade to patched FreePBX versions: 15.0.13, 16.0.15, or 17.0.3 to eliminate the hard-coded OAuth key vulnerability. 2. Audit all FreePBX installations to identify versions and check if the 'api' module is enabled and exposed remotely. 3. Restrict network access to the FreePBX API endpoints by implementing firewall rules or VPN access to limit exposure to trusted networks only. 4. Rotate any OAuth keys or tokens associated with the 'api' module post-upgrade to invalidate any potentially compromised credentials. 5. Monitor API access logs for suspicious JWT token usage or anomalous API calls indicative of token forgery attempts. 6. Implement multi-factor authentication (MFA) for administrative access where possible to add an additional security layer. 7. Regularly review and apply security patches for FreePBX and related telephony infrastructure. 8. Conduct penetration testing focused on PBX API endpoints to verify the effectiveness of mitigations and detect any residual vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-55739: CWE-798: Use of Hard-coded Credentials in FreePBX security-reporting
Description
api is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk© (PBX). In versions lower than 15.0.13, 16.0.2 through 16.0.14, 17.0.1 and 17.0.2, there is an identical OAuth private key used across multiple systems that installed the same FreePBX RPM or DEB package. An attacker with access to the shared OAuth private key could forge JWT tokens, bypass authentication, and potentially gain full access to both REST and GraphQL APIs. Systems with the "api" module enabled, configured and previously activated by an administrator for remote inbound connections may be affected. This issue is fixed in versions 15.0.13, 16.0.15 and 17.0.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-55739 is a medium-severity vulnerability affecting the 'api' module of FreePBX, an open-source GUI used to manage Asterisk PBX systems. The vulnerability arises from the use of a hard-coded OAuth private key that is identical across multiple installations of FreePBX RPM or DEB packages in affected versions: all versions below 15.0.13, versions from 16.0.2 up to but not including 16.0.15, and versions 17.0.1 and 17.0.2. This shared private key enables an attacker who obtains it to forge JSON Web Tokens (JWTs), thereby bypassing authentication mechanisms. With forged JWTs, the attacker can gain unauthorized full access to both REST and GraphQL APIs exposed by the FreePBX system. This is particularly critical for systems where the 'api' module is enabled, configured, and previously activated by an administrator for remote inbound connections. The vulnerability stems from CWE-798 (Use of Hard-coded Credentials) and CWE-522 (Insufficiently Protected Credentials). The issue has been addressed in FreePBX versions 15.0.13, 16.0.15, and 17.0.3. The CVSS v4.0 base score is 5.1, reflecting a medium severity level, with attack vector being network-based, low attack complexity, no privileges required, but user interaction needed, and limited impact on confidentiality, integrity, and availability. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using FreePBX systems with the vulnerable 'api' module enabled and exposed to remote inbound connections, this vulnerability poses a significant risk. An attacker exploiting this flaw can bypass authentication controls and gain full API access, potentially allowing them to manipulate telephony configurations, intercept or redirect calls, access sensitive call data, or disrupt PBX services. Such unauthorized access could lead to data breaches involving call logs or customer information, service outages impacting business communications, and potential financial fraud or espionage. Given the critical role of PBX systems in enterprise telephony infrastructure, exploitation could disrupt business operations and damage organizational reputation. The medium CVSS score suggests moderate risk, but the ease of exploitation (no privileges required) and the potential for full API control elevate the threat level. European organizations in sectors relying heavily on telephony, such as finance, healthcare, and government, may face heightened risks. Additionally, organizations with remote-accessible FreePBX APIs are particularly vulnerable, emphasizing the need for immediate remediation.
Mitigation Recommendations
1. Immediate upgrade to patched FreePBX versions: 15.0.13, 16.0.15, or 17.0.3 to eliminate the hard-coded OAuth key vulnerability. 2. Audit all FreePBX installations to identify versions and check if the 'api' module is enabled and exposed remotely. 3. Restrict network access to the FreePBX API endpoints by implementing firewall rules or VPN access to limit exposure to trusted networks only. 4. Rotate any OAuth keys or tokens associated with the 'api' module post-upgrade to invalidate any potentially compromised credentials. 5. Monitor API access logs for suspicious JWT token usage or anomalous API calls indicative of token forgery attempts. 6. Implement multi-factor authentication (MFA) for administrative access where possible to add an additional security layer. 7. Regularly review and apply security patches for FreePBX and related telephony infrastructure. 8. Conduct penetration testing focused on PBX API endpoints to verify the effectiveness of mitigations and detect any residual vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-14T22:31:17.683Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ba231188499799243e04b1
Added to database: 9/4/2025, 11:38:57 PM
Last enriched: 9/4/2025, 11:53:54 PM
Last updated: 10/18/2025, 4:54:23 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62669: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in The Wikimedia Foundation Mediawiki - CentralAuth Extension
MediumCVE-2025-62668: CWE-276 Incorrect Default Permissions in The Wikimedia Foundation Mediawiki - GrowthExperiments Extension
MediumCVE-2025-62671: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - Cargo Extension
MediumCVE-2025-62670: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - FlexDiagrams Extension
MediumCVE-2025-11361: CWE-918 Server-Side Request Forgery (SSRF) in wpdevteam Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.