CVE-2025-59429: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in FreePBX core
FreePBX is an open source GUI for managing Asterisk. In versions prior to 16.0.68.39 for FreePBX 16 and versions prior to 17.0.18.38 for FreePBX 17, a reflected cross-site scripting vulnerability is present on the Asterisk HTTP Status page. The Asterisk HTTP status page is exposed by FreePBX and is available by default on version 16 via any bound IP address at port 8088. By default on version 17, the binding is only to localhost IP, making it significantly less vulnerable. The vulnerability can be exploited by unauthenticated attackers to obtain cookies from logged-in users, allowing them to hijack a session of an administrative user. The theft of admin session cookies allows attackers to gain control over the FreePBX admin interface, enabling them to access sensitive data, modify system configurations, create backdoor accounts, and cause service disruption. This issue has been patched in version 16.0.68.39 for FreePBX 16 and version 17.0.18.38 for FreePBX 17.
AI Analysis
Technical Summary
CVE-2025-59429 is a reflected cross-site scripting vulnerability classified under CWE-79, found in the FreePBX core management interface for Asterisk PBX systems. The vulnerability exists in the Asterisk HTTP Status page, which improperly neutralizes user input during web page generation, allowing malicious scripts to be injected and executed in the context of an administrative user's browser. In FreePBX 16, this page is exposed by default on all bound IP addresses at port 8088, making it accessible to remote attackers. In FreePBX 17, the page is bound only to localhost by default, reducing exposure but not eliminating risk if local access is compromised. Exploitation requires no authentication and no user interaction beyond the victim visiting a crafted URL, enabling attackers to steal session cookies from logged-in administrators. With stolen cookies, attackers can hijack admin sessions, gaining full control over the FreePBX interface. This control allows attackers to access sensitive telephony data, alter system configurations, create persistent backdoor accounts, and disrupt telephony services. The vulnerability has been addressed in FreePBX versions 16.0.68.39 and 17.0.18.38. No known exploits are currently reported in the wild, but the high CVSS score of 8.5 reflects the significant risk posed by this flaw due to its ease of exploitation and potential impact.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of telephony infrastructure managed via FreePBX. Successful exploitation can lead to unauthorized administrative access, exposing sensitive call data and internal communications. Attackers could modify system configurations, potentially intercepting or redirecting calls, creating backdoors for persistent access, or causing denial of service by disrupting telephony operations. Given the critical role of telephony in business communications, such disruptions could impact operational continuity and compliance with data protection regulations like GDPR. Organizations in sectors relying heavily on telephony, such as finance, healthcare, and government, face heightened risks. The default exposure of the vulnerable interface on network-facing IPs in FreePBX 16 increases the attack surface, especially in environments where network segmentation or firewalling is insufficient. Even in FreePBX 17, local exposure could be exploited via compromised internal hosts or malicious insiders. The lack of known exploits in the wild suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately upgrade FreePBX core to versions 16.0.68.39 or 17.0.18.38 or later to apply the official patch. Until patching is complete, restrict network access to port 8088, especially from untrusted networks, by implementing firewall rules or network segmentation to limit exposure of the Asterisk HTTP Status page. For FreePBX 16 installations, consider binding the HTTP Status page to localhost or trusted IP addresses only, mimicking the default behavior of FreePBX 17. Employ web application firewalls (WAFs) with rules to detect and block reflected XSS payloads targeting the status page. Monitor administrative sessions for unusual activity and implement multi-factor authentication (MFA) for FreePBX admin accounts to reduce the impact of session hijacking. Regularly audit FreePBX logs and configurations for unauthorized changes or new accounts. Educate administrators about phishing and social engineering risks that could facilitate exploitation. Finally, maintain an up-to-date inventory of FreePBX deployments and ensure timely application of security updates.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-59429: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in FreePBX core
Description
FreePBX is an open source GUI for managing Asterisk. In versions prior to 16.0.68.39 for FreePBX 16 and versions prior to 17.0.18.38 for FreePBX 17, a reflected cross-site scripting vulnerability is present on the Asterisk HTTP Status page. The Asterisk HTTP status page is exposed by FreePBX and is available by default on version 16 via any bound IP address at port 8088. By default on version 17, the binding is only to localhost IP, making it significantly less vulnerable. The vulnerability can be exploited by unauthenticated attackers to obtain cookies from logged-in users, allowing them to hijack a session of an administrative user. The theft of admin session cookies allows attackers to gain control over the FreePBX admin interface, enabling them to access sensitive data, modify system configurations, create backdoor accounts, and cause service disruption. This issue has been patched in version 16.0.68.39 for FreePBX 16 and version 17.0.18.38 for FreePBX 17.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-59429 is a reflected cross-site scripting vulnerability classified under CWE-79, found in the FreePBX core management interface for Asterisk PBX systems. The vulnerability exists in the Asterisk HTTP Status page, which improperly neutralizes user input during web page generation, allowing malicious scripts to be injected and executed in the context of an administrative user's browser. In FreePBX 16, this page is exposed by default on all bound IP addresses at port 8088, making it accessible to remote attackers. In FreePBX 17, the page is bound only to localhost by default, reducing exposure but not eliminating risk if local access is compromised. Exploitation requires no authentication and no user interaction beyond the victim visiting a crafted URL, enabling attackers to steal session cookies from logged-in administrators. With stolen cookies, attackers can hijack admin sessions, gaining full control over the FreePBX interface. This control allows attackers to access sensitive telephony data, alter system configurations, create persistent backdoor accounts, and disrupt telephony services. The vulnerability has been addressed in FreePBX versions 16.0.68.39 and 17.0.18.38. No known exploits are currently reported in the wild, but the high CVSS score of 8.5 reflects the significant risk posed by this flaw due to its ease of exploitation and potential impact.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of telephony infrastructure managed via FreePBX. Successful exploitation can lead to unauthorized administrative access, exposing sensitive call data and internal communications. Attackers could modify system configurations, potentially intercepting or redirecting calls, creating backdoors for persistent access, or causing denial of service by disrupting telephony operations. Given the critical role of telephony in business communications, such disruptions could impact operational continuity and compliance with data protection regulations like GDPR. Organizations in sectors relying heavily on telephony, such as finance, healthcare, and government, face heightened risks. The default exposure of the vulnerable interface on network-facing IPs in FreePBX 16 increases the attack surface, especially in environments where network segmentation or firewalling is insufficient. Even in FreePBX 17, local exposure could be exploited via compromised internal hosts or malicious insiders. The lack of known exploits in the wild suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately upgrade FreePBX core to versions 16.0.68.39 or 17.0.18.38 or later to apply the official patch. Until patching is complete, restrict network access to port 8088, especially from untrusted networks, by implementing firewall rules or network segmentation to limit exposure of the Asterisk HTTP Status page. For FreePBX 16 installations, consider binding the HTTP Status page to localhost or trusted IP addresses only, mimicking the default behavior of FreePBX 17. Employ web application firewalls (WAFs) with rules to detect and block reflected XSS payloads targeting the status page. Monitor administrative sessions for unusual activity and implement multi-factor authentication (MFA) for FreePBX admin accounts to reduce the impact of session hijacking. Regularly audit FreePBX logs and configurations for unauthorized changes or new accounts. Educate administrators about phishing and social engineering risks that could facilitate exploitation. Finally, maintain an up-to-date inventory of FreePBX deployments and ensure timely application of security updates.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-15T19:13:16.905Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68eea592ae73b78941f498ca
Added to database: 10/14/2025, 7:33:38 PM
Last enriched: 2/14/2026, 7:14:07 AM
Last updated: 3/25/2026, 12:16:57 PM
Views: 119
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.