Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61678: CWE-434: Unrestricted Upload of File with Dangerous Type in FreePBX endpointman

0
High
VulnerabilityCVE-2025-61678cvecve-2025-61678cwe-434
Published: Tue Oct 14 2025 (10/14/2025, 19:33:29 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: endpointman

Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions prior to 16.0.92 for FreePBX 16 and versions prior to 17.0.6 for FreePBX 17, the Endpoint Manager module contains an authenticated arbitrary file upload vulnerability affecting the fwbrand parameter. The fwbrand parameter allows an attacker to change the file path. Combined, these issues can result in a webshell being uploaded. Authentication with a known username is required to exploit this vulnerability. Successful exploitation allows authenticated users to upload arbitrary files to attacker-controlled paths on the server, potentially leading to remote code execution. This issue has been patched in version 16.0.92 for FreePBX 16 and version 17.0.6 for FreePBX 17.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:54:27 UTC

Technical Analysis

CVE-2025-61678 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the Endpoint Manager module of FreePBX, a popular open-source PBX telephony system. The flaw exists in versions prior to 16.0.92 for FreePBX 16 and versions prior to 17.0.6 for FreePBX 17. It involves the fwbrand parameter, which is improperly validated and allows authenticated users to manipulate the file path during file uploads. This manipulation enables attackers to upload arbitrary files, including malicious webshells, to locations on the server that they control. Since the vulnerability requires authentication with a known username but no additional user interaction, it is exploitable by insiders or attackers who have obtained valid credentials. Successful exploitation can lead to remote code execution, compromising the confidentiality, integrity, and availability of the affected system. The CVSS 4.0 base score is 8.6 (high), reflecting the network attack vector, low attack complexity, and high impact on confidentiality and integrity. The vulnerability has been patched in FreePBX versions 16.0.92 and 17.0.6, and users are strongly advised to upgrade. No known exploits have been reported in the wild yet, but the potential impact on telephony infrastructure is significant given the critical role of FreePBX in enterprise communications.

Potential Impact

The vulnerability allows authenticated attackers to upload arbitrary files, including webshells, enabling remote code execution on FreePBX servers. This can lead to full system compromise, unauthorized access to sensitive telephony data, interception or manipulation of calls, disruption of telephony services, and lateral movement within the network. Organizations relying on FreePBX for voice communications, especially those in sectors like finance, healthcare, government, and large enterprises, face risks of operational downtime, data breaches, and reputational damage. The ability to upload files to attacker-controlled paths increases the risk of persistent backdoors and further exploitation. Since FreePBX is often exposed to internal networks or VPNs, attackers with stolen credentials or insider access can exploit this vulnerability to escalate privileges and compromise critical infrastructure.

Mitigation Recommendations

1. Immediately upgrade FreePBX Endpoint Manager to version 16.0.92 or later for FreePBX 16, or version 17.0.6 or later for FreePBX 17 to apply the official patch. 2. Restrict access to the Endpoint Manager module to trusted administrators only, using network segmentation and strong authentication mechanisms such as multi-factor authentication (MFA). 3. Monitor logs for unusual file upload activity or changes to the fwbrand parameter to detect potential exploitation attempts. 4. Implement application-layer firewalls or web application firewalls (WAFs) with rules to detect and block suspicious file uploads or path traversal attempts. 5. Regularly audit user accounts and credentials to ensure no unauthorized access is possible, and enforce strong password policies. 6. Conduct periodic security assessments and penetration testing focused on telephony infrastructure to identify and remediate similar vulnerabilities. 7. Backup configuration and system data regularly to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-29T20:25:16.181Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68eea752bbec4fba96d79ee2

Added to database: 10/14/2025, 7:41:06 PM

Last enriched: 2/27/2026, 5:54:27 AM

Last updated: 3/24/2026, 12:58:58 PM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses