Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61678: CWE-434: Unrestricted Upload of File with Dangerous Type in FreePBX security-reporting

0
High
VulnerabilityCVE-2025-61678cvecve-2025-61678cwe-434
Published: Tue Oct 14 2025 (10/14/2025, 19:33:29 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: security-reporting

Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions prior to 16.0.92 for FreePBX 16 and versions prior to 17.0.6 for FreePBX 17, the Endpoint Manager module contains an authenticated arbitrary file upload vulnerability affecting the fwbrand parameter. The fwbrand parameter allows an attacker to change the file path. Combined, these issues can result in a webshell being uploaded. Authentication with a known username is required to exploit this vulnerability. Successful exploitation allows authenticated users to upload arbitrary files to attacker-controlled paths on the server, potentially leading to remote code execution. This issue has been patched in version 16.0.92 for FreePBX 16 and version 17.0.6 for FreePBX 17.

AI-Powered Analysis

AILast updated: 10/14/2025, 19:41:52 UTC

Technical Analysis

CVE-2025-61678 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the FreePBX Endpoint Manager module, which manages telephony endpoints in FreePBX systems. The flaw exists in versions prior to 16.0.92 for FreePBX 16 and versions prior to 17.0.6 for FreePBX 17. The vulnerability stems from insufficient validation of the fwbrand parameter, which controls the file path during file uploads. Authenticated users with a known username can exploit this by manipulating the fwbrand parameter to upload arbitrary files, including malicious webshells, to attacker-controlled locations on the server. This can lead to remote code execution, compromising the server’s confidentiality, integrity, and availability. The attack vector requires network access and valid credentials but does not require user interaction beyond authentication. The vulnerability has been publicly disclosed and assigned a CVSS 4.0 score of 8.6, indicating high severity. No known exploits are currently reported in the wild. The issue has been addressed in FreePBX Endpoint Manager versions 16.0.92 and 17.0.6, where proper validation and restrictions have been implemented to prevent arbitrary file uploads. Organizations running vulnerable versions should prioritize patching to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk to telephony infrastructure, particularly those relying on FreePBX for endpoint management. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to gain control over telephony servers, intercept or manipulate voice communications, disrupt services, or use compromised systems as a foothold for lateral movement within the network. This can result in data breaches, service outages, and reputational damage. Critical sectors such as telecommunications providers, call centers, government agencies, and enterprises with VoIP infrastructure are especially vulnerable. Given the widespread use of FreePBX in Europe, the potential impact includes disruption of essential communication services and exposure of sensitive communications data. The requirement for authentication limits exploitation to insiders or attackers who have obtained valid credentials, but this does not eliminate the risk, as credential compromise is common. The high CVSS score reflects the severe consequences of exploitation combined with relatively low attack complexity.

Mitigation Recommendations

1. Immediately upgrade FreePBX Endpoint Manager to version 16.0.92 or 17.0.6 or later to apply the official patch addressing this vulnerability. 2. Restrict access to the Endpoint Manager module by enforcing strict role-based access controls and limiting user permissions to only trusted administrators. 3. Implement multi-factor authentication (MFA) for all accounts with access to FreePBX administrative interfaces to reduce the risk of credential compromise. 4. Monitor logs and file system changes for unusual file uploads or modifications, especially in directories accessible via the web server. 5. Employ network segmentation to isolate telephony infrastructure from general user networks, limiting exposure to potential attackers. 6. Conduct regular security audits and vulnerability scans on FreePBX systems to detect outdated versions or misconfigurations. 7. Educate administrators on the risks of credential reuse and phishing attacks to minimize the chance of unauthorized access. 8. Consider deploying web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts targeting the fwbrand parameter or similar vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-29T20:25:16.181Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68eea752bbec4fba96d79ee2

Added to database: 10/14/2025, 7:41:06 PM

Last enriched: 10/14/2025, 7:41:52 PM

Last updated: 10/15/2025, 1:56:33 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats