CVE-2025-55739: CWE-798: Use of Hard-coded Credentials in FreePBX api
api is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk© (PBX). In versions lower than 15.0.13, 16.0.2 through 16.0.14, 17.0.1 and 17.0.2, there is an identical OAuth private key used across multiple systems that installed the same FreePBX RPM or DEB package. An attacker with access to the shared OAuth private key could forge JWT tokens, bypass authentication, and potentially gain full access to both REST and GraphQL APIs. Systems with the "api" module enabled, configured and previously activated by an administrator for remote inbound connections may be affected. This issue is fixed in versions 15.0.13, 16.0.15 and 17.0.3.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-55739 affects the 'api' module of FreePBX, an open-source GUI managing Asterisk PBX systems. In affected versions (<15.0.13, 16.0.2 to 16.0.14, and 17.0.1 to 17.0.2), the OAuth private key used for signing JWT tokens is hard-coded and identical across multiple systems installed from the same FreePBX RPM or DEB package. This design flaw violates secure credential management principles (CWE-798) and leads to weak authentication controls (CWE-522). An attacker who obtains this shared private key can forge valid JWT tokens, bypassing authentication mechanisms to gain unauthorized access to the REST and GraphQL APIs exposed by the 'api' module. Such access could allow full control over telephony configurations, call routing, and potentially sensitive call data. The vulnerability requires that the 'api' module be enabled and configured for remote inbound connections, which is typically done by administrators who expose these APIs for remote management. The CVSS 4.0 base score is 5.1 (medium), reflecting network attack vector, low attack complexity, no privileges required, but some user interaction needed, and limited impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the presence of a hard-coded key makes exploitation feasible once the key is obtained. The issue is resolved in FreePBX versions 15.0.13, 16.0.15, and 17.0.3 by replacing the hard-coded key with unique, per-installation keys or other secure authentication mechanisms.
Potential Impact
For European organizations, this vulnerability poses a significant risk to telephony infrastructure security. Compromise of FreePBX systems could lead to unauthorized call interception, fraudulent call routing, toll fraud, and disruption of voice services. Confidentiality of communications may be breached, and integrity of call handling compromised. Organizations relying on FreePBX for critical communications, especially in sectors like finance, healthcare, and government, could face operational disruptions and data privacy violations. The ease of exploitation due to the shared hard-coded key increases the threat level, particularly for organizations exposing the 'api' module to remote networks. Additionally, attackers could use compromised PBX systems as pivot points for further network intrusion. The medium CVSS score reflects moderate impact but the potential for serious consequences in environments where telephony is mission-critical.
Mitigation Recommendations
European organizations should immediately verify their FreePBX versions and upgrade to 15.0.13, 16.0.15, or 17.0.3 or later to apply the patch that eliminates the hard-coded OAuth key. If immediate patching is not feasible, administrators should disable the 'api' module or restrict its remote access using network-level controls such as firewalls or VPNs to limit exposure. Audit existing API keys and JWT tokens for signs of unauthorized use. Implement strict monitoring and logging of API access to detect anomalous activity. Additionally, enforce strong administrative access controls and multi-factor authentication for PBX management interfaces. Network segmentation should isolate PBX systems from general user networks to reduce attack surface. Regularly review and update security policies related to telephony infrastructure. Finally, coordinate with vendors and security teams to stay informed about any emerging exploits or indicators of compromise related to this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-55739: CWE-798: Use of Hard-coded Credentials in FreePBX api
Description
api is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk© (PBX). In versions lower than 15.0.13, 16.0.2 through 16.0.14, 17.0.1 and 17.0.2, there is an identical OAuth private key used across multiple systems that installed the same FreePBX RPM or DEB package. An attacker with access to the shared OAuth private key could forge JWT tokens, bypass authentication, and potentially gain full access to both REST and GraphQL APIs. Systems with the "api" module enabled, configured and previously activated by an administrator for remote inbound connections may be affected. This issue is fixed in versions 15.0.13, 16.0.15 and 17.0.3.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-55739 affects the 'api' module of FreePBX, an open-source GUI managing Asterisk PBX systems. In affected versions (<15.0.13, 16.0.2 to 16.0.14, and 17.0.1 to 17.0.2), the OAuth private key used for signing JWT tokens is hard-coded and identical across multiple systems installed from the same FreePBX RPM or DEB package. This design flaw violates secure credential management principles (CWE-798) and leads to weak authentication controls (CWE-522). An attacker who obtains this shared private key can forge valid JWT tokens, bypassing authentication mechanisms to gain unauthorized access to the REST and GraphQL APIs exposed by the 'api' module. Such access could allow full control over telephony configurations, call routing, and potentially sensitive call data. The vulnerability requires that the 'api' module be enabled and configured for remote inbound connections, which is typically done by administrators who expose these APIs for remote management. The CVSS 4.0 base score is 5.1 (medium), reflecting network attack vector, low attack complexity, no privileges required, but some user interaction needed, and limited impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the presence of a hard-coded key makes exploitation feasible once the key is obtained. The issue is resolved in FreePBX versions 15.0.13, 16.0.15, and 17.0.3 by replacing the hard-coded key with unique, per-installation keys or other secure authentication mechanisms.
Potential Impact
For European organizations, this vulnerability poses a significant risk to telephony infrastructure security. Compromise of FreePBX systems could lead to unauthorized call interception, fraudulent call routing, toll fraud, and disruption of voice services. Confidentiality of communications may be breached, and integrity of call handling compromised. Organizations relying on FreePBX for critical communications, especially in sectors like finance, healthcare, and government, could face operational disruptions and data privacy violations. The ease of exploitation due to the shared hard-coded key increases the threat level, particularly for organizations exposing the 'api' module to remote networks. Additionally, attackers could use compromised PBX systems as pivot points for further network intrusion. The medium CVSS score reflects moderate impact but the potential for serious consequences in environments where telephony is mission-critical.
Mitigation Recommendations
European organizations should immediately verify their FreePBX versions and upgrade to 15.0.13, 16.0.15, or 17.0.3 or later to apply the patch that eliminates the hard-coded OAuth key. If immediate patching is not feasible, administrators should disable the 'api' module or restrict its remote access using network-level controls such as firewalls or VPNs to limit exposure. Audit existing API keys and JWT tokens for signs of unauthorized use. Implement strict monitoring and logging of API access to detect anomalous activity. Additionally, enforce strong administrative access controls and multi-factor authentication for PBX management interfaces. Network segmentation should isolate PBX systems from general user networks to reduce attack surface. Regularly review and update security policies related to telephony infrastructure. Finally, coordinate with vendors and security teams to stay informed about any emerging exploits or indicators of compromise related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-14T22:31:17.683Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ba231188499799243e04b1
Added to database: 9/4/2025, 11:38:57 PM
Last enriched: 2/14/2026, 7:13:23 AM
Last updated: 3/26/2026, 8:45:54 AM
Views: 123
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.