Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59051: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in FreePBX endpoint

0
High
VulnerabilityCVE-2025-59051cvecve-2025-59051cwe-78
Published: Tue Oct 14 2025 (10/14/2025, 19:15:54 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: endpoint

Description

The FreePBX Endpoint Manager module includes a Network Scanning feature that provides web-based access to nmap functionality for network device discovery. In Endpoint Manager 16 before 16.0.92 and 17 before 17.0.6, insufficiently sanitized user-supplied input allows authenticated OS command execution as the asterisk user. Authentication with a known username is required. Updating to Endpoint Manager 16.0.92 or 17.0.6 addresses the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 07:13:48 UTC

Technical Analysis

The vulnerability identified as CVE-2025-59051 resides in the FreePBX Endpoint Manager module, specifically within its Network Scanning feature that integrates nmap functionality for discovering network devices via a web interface. The root cause is improper neutralization of special elements in user-supplied input, classified under CWE-78 (OS Command Injection). This flaw allows an authenticated attacker—who must know a valid username—to inject and execute arbitrary operating system commands with the privileges of the 'asterisk' user, which typically runs the telephony services. The affected versions include Endpoint Manager 16 versions before 16.0.92 and versions 17.0.0 up to 17.0.6. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low complexity. The CVSS 4.0 score of 8.6 reflects high impact on confidentiality, integrity, and availability, with high scope and privileges required but no user interaction. Exploitation could allow attackers to manipulate telephony infrastructure, intercept or disrupt communications, or pivot to other internal systems. The issue is resolved by updating to versions 16.0.92 or 17.0.6 or later. No public exploits have been reported yet, but the presence of a web-accessible nmap interface combined with command injection makes this a critical risk for affected deployments.

Potential Impact

European organizations relying on FreePBX for their telephony and unified communications infrastructure face significant risks from this vulnerability. Successful exploitation could lead to unauthorized command execution on telephony servers, potentially allowing attackers to intercept calls, disrupt communication services, or gain a foothold for lateral movement within corporate networks. This could result in data breaches, service outages, and reputational damage. Given the critical role of telephony in business operations, especially in sectors like finance, healthcare, and government, the impact could extend to regulatory non-compliance and operational disruption. The high CVSS score indicates a serious threat that could compromise confidentiality, integrity, and availability of communications. Organizations with remote or web-accessible FreePBX management interfaces are particularly vulnerable. The lack of known exploits in the wild suggests a window of opportunity for defenders to patch before active exploitation occurs.

Mitigation Recommendations

Organizations should immediately verify their FreePBX Endpoint Manager versions and upgrade to 16.0.92 or 17.0.6 or later to remediate the vulnerability. Restrict access to the Endpoint Manager web interface using network segmentation, VPNs, or IP whitelisting to reduce exposure. Implement strong authentication mechanisms and monitor authentication logs for suspicious activity. Disable or restrict the Network Scanning feature if not required. Employ application-layer firewalls or web application firewalls (WAFs) to detect and block command injection attempts. Regularly audit and harden telephony infrastructure configurations. Conduct penetration testing focusing on command injection vectors in telephony management interfaces. Maintain up-to-date backups of telephony configurations and systems to enable rapid recovery in case of compromise. Finally, monitor threat intelligence sources for any emerging exploit activity related to this CVE.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-08T16:19:26.172Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68eea592ae73b78941f498d3

Added to database: 10/14/2025, 7:33:38 PM

Last enriched: 2/14/2026, 7:13:48 AM

Last updated: 3/24/2026, 7:47:18 PM

Views: 158

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses