Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55739: CWE-798: Use of Hard-coded Credentials in FreePBX api

0
Medium
VulnerabilityCVE-2025-55739cvecve-2025-55739cwe-798cwe-522
Published: Thu Sep 04 2025 (09/04/2025, 23:22:43 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: api

Description

api is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk© (PBX). In versions lower than 15.0.13, 16.0.2 through 16.0.14, 17.0.1 and 17.0.2, there is an identical OAuth private key used across multiple systems that installed the same FreePBX RPM or DEB package. An attacker with access to the shared OAuth private key could forge JWT tokens, bypass authentication, and potentially gain full access to both REST and GraphQL APIs. Systems with the "api" module enabled, configured and previously activated by an administrator for remote inbound connections may be affected. This issue is fixed in versions 15.0.13, 16.0.15 and 17.0.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 07:13:23 UTC

Technical Analysis

The vulnerability identified as CVE-2025-55739 affects the 'api' module of FreePBX, an open-source GUI managing Asterisk PBX systems. In affected versions (<15.0.13, 16.0.2 to 16.0.14, and 17.0.1 to 17.0.2), the OAuth private key used for signing JWT tokens is hard-coded and identical across multiple systems installed from the same FreePBX RPM or DEB package. This design flaw violates secure credential management principles (CWE-798) and leads to weak authentication controls (CWE-522). An attacker who obtains this shared private key can forge valid JWT tokens, bypassing authentication mechanisms to gain unauthorized access to the REST and GraphQL APIs exposed by the 'api' module. Such access could allow full control over telephony configurations, call routing, and potentially sensitive call data. The vulnerability requires that the 'api' module be enabled and configured for remote inbound connections, which is typically done by administrators who expose these APIs for remote management. The CVSS 4.0 base score is 5.1 (medium), reflecting network attack vector, low attack complexity, no privileges required, but some user interaction needed, and limited impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the presence of a hard-coded key makes exploitation feasible once the key is obtained. The issue is resolved in FreePBX versions 15.0.13, 16.0.15, and 17.0.3 by replacing the hard-coded key with unique, per-installation keys or other secure authentication mechanisms.

Potential Impact

For European organizations, this vulnerability poses a significant risk to telephony infrastructure security. Compromise of FreePBX systems could lead to unauthorized call interception, fraudulent call routing, toll fraud, and disruption of voice services. Confidentiality of communications may be breached, and integrity of call handling compromised. Organizations relying on FreePBX for critical communications, especially in sectors like finance, healthcare, and government, could face operational disruptions and data privacy violations. The ease of exploitation due to the shared hard-coded key increases the threat level, particularly for organizations exposing the 'api' module to remote networks. Additionally, attackers could use compromised PBX systems as pivot points for further network intrusion. The medium CVSS score reflects moderate impact but the potential for serious consequences in environments where telephony is mission-critical.

Mitigation Recommendations

European organizations should immediately verify their FreePBX versions and upgrade to 15.0.13, 16.0.15, or 17.0.3 or later to apply the patch that eliminates the hard-coded OAuth key. If immediate patching is not feasible, administrators should disable the 'api' module or restrict its remote access using network-level controls such as firewalls or VPNs to limit exposure. Audit existing API keys and JWT tokens for signs of unauthorized use. Implement strict monitoring and logging of API access to detect anomalous activity. Additionally, enforce strong administrative access controls and multi-factor authentication for PBX management interfaces. Network segmentation should isolate PBX systems from general user networks to reduce attack surface. Regularly review and update security policies related to telephony infrastructure. Finally, coordinate with vendors and security teams to stay informed about any emerging exploits or indicators of compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-14T22:31:17.683Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ba231188499799243e04b1

Added to database: 9/4/2025, 11:38:57 PM

Last enriched: 2/14/2026, 7:13:23 AM

Last updated: 3/26/2026, 8:45:54 AM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses