Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59429: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in FreePBX core

0
High
VulnerabilityCVE-2025-59429cvecve-2025-59429cwe-79
Published: Tue Oct 14 2025 (10/14/2025, 19:26:02 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: core

Description

FreePBX is an open source GUI for managing Asterisk. In versions prior to 16.0.68.39 for FreePBX 16 and versions prior to 17.0.18.38 for FreePBX 17, a reflected cross-site scripting vulnerability is present on the Asterisk HTTP Status page. The Asterisk HTTP status page is exposed by FreePBX and is available by default on version 16 via any bound IP address at port 8088. By default on version 17, the binding is only to localhost IP, making it significantly less vulnerable. The vulnerability can be exploited by unauthenticated attackers to obtain cookies from logged-in users, allowing them to hijack a session of an administrative user. The theft of admin session cookies allows attackers to gain control over the FreePBX admin interface, enabling them to access sensitive data, modify system configurations, create backdoor accounts, and cause service disruption. This issue has been patched in version 16.0.68.39 for FreePBX 16 and version 17.0.18.38 for FreePBX 17.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 07:14:07 UTC

Technical Analysis

CVE-2025-59429 is a reflected cross-site scripting vulnerability classified under CWE-79, found in the FreePBX core management interface for Asterisk PBX systems. The vulnerability exists in the Asterisk HTTP Status page, which improperly neutralizes user input during web page generation, allowing malicious scripts to be injected and executed in the context of an administrative user's browser. In FreePBX 16, this page is exposed by default on all bound IP addresses at port 8088, making it accessible to remote attackers. In FreePBX 17, the page is bound only to localhost by default, reducing exposure but not eliminating risk if local access is compromised. Exploitation requires no authentication and no user interaction beyond the victim visiting a crafted URL, enabling attackers to steal session cookies from logged-in administrators. With stolen cookies, attackers can hijack admin sessions, gaining full control over the FreePBX interface. This control allows attackers to access sensitive telephony data, alter system configurations, create persistent backdoor accounts, and disrupt telephony services. The vulnerability has been addressed in FreePBX versions 16.0.68.39 and 17.0.18.38. No known exploits are currently reported in the wild, but the high CVSS score of 8.5 reflects the significant risk posed by this flaw due to its ease of exploitation and potential impact.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of telephony infrastructure managed via FreePBX. Successful exploitation can lead to unauthorized administrative access, exposing sensitive call data and internal communications. Attackers could modify system configurations, potentially intercepting or redirecting calls, creating backdoors for persistent access, or causing denial of service by disrupting telephony operations. Given the critical role of telephony in business communications, such disruptions could impact operational continuity and compliance with data protection regulations like GDPR. Organizations in sectors relying heavily on telephony, such as finance, healthcare, and government, face heightened risks. The default exposure of the vulnerable interface on network-facing IPs in FreePBX 16 increases the attack surface, especially in environments where network segmentation or firewalling is insufficient. Even in FreePBX 17, local exposure could be exploited via compromised internal hosts or malicious insiders. The lack of known exploits in the wild suggests a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

European organizations should immediately upgrade FreePBX core to versions 16.0.68.39 or 17.0.18.38 or later to apply the official patch. Until patching is complete, restrict network access to port 8088, especially from untrusted networks, by implementing firewall rules or network segmentation to limit exposure of the Asterisk HTTP Status page. For FreePBX 16 installations, consider binding the HTTP Status page to localhost or trusted IP addresses only, mimicking the default behavior of FreePBX 17. Employ web application firewalls (WAFs) with rules to detect and block reflected XSS payloads targeting the status page. Monitor administrative sessions for unusual activity and implement multi-factor authentication (MFA) for FreePBX admin accounts to reduce the impact of session hijacking. Regularly audit FreePBX logs and configurations for unauthorized changes or new accounts. Educate administrators about phishing and social engineering risks that could facilitate exploitation. Finally, maintain an up-to-date inventory of FreePBX deployments and ensure timely application of security updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-15T19:13:16.905Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68eea592ae73b78941f498ca

Added to database: 10/14/2025, 7:33:38 PM

Last enriched: 2/14/2026, 7:14:07 AM

Last updated: 3/25/2026, 12:16:57 PM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses