Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64328: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in FreePBX filestore

0
High
VulnerabilityCVE-2025-64328cvecve-2025-64328cwe-78
Published: Fri Nov 07 2025 (11/07/2025, 03:32:20 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: filestore

Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to obtain remote access to the system as an asterisk user. This issue is fixed in version 17.0.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:51:19 UTC

Technical Analysis

CVE-2025-64328 is an OS command injection vulnerability classified under CWE-78, affecting the filestore module within the FreePBX Endpoint Manager administrative interface. Specifically, versions 17.0.2.36 through 17.0.3 (exclusive) contain a flaw in the testconnection -> check_ssh_connect() function, which improperly neutralizes special characters in user-supplied input. This improper sanitization allows an authenticated user to inject arbitrary OS commands that are executed with the privileges of the 'asterisk' user on the underlying system. The vulnerability requires authentication but no additional user interaction or elevated privileges beyond a known user account. Successful exploitation can lead to remote code execution, enabling attackers to gain control over the telephony system, manipulate call routing, intercept communications, or pivot to other internal network resources. The issue was publicly disclosed on November 7, 2025, with a CVSS v4.0 score of 8.6, indicating high severity. The vendor addressed the vulnerability in FreePBX version 17.0.3. No known active exploits have been reported to date, but the potential impact on telephony infrastructure is significant given FreePBX's widespread use in enterprise and service provider environments.

Potential Impact

The impact of CVE-2025-64328 is substantial for organizations relying on FreePBX for telephony management. Exploitation allows attackers to execute arbitrary commands as the 'asterisk' user, which typically has extensive control over telephony functions and potentially underlying system resources. This can lead to unauthorized call interception, manipulation of call routing, disruption of telephony services, and potential lateral movement within the network. Given FreePBX's deployment in many enterprises, call centers, and service providers worldwide, a successful attack could result in significant operational disruption, data breaches involving call metadata or recordings, and reputational damage. The vulnerability's post-authentication nature means that attackers who have compromised or obtained valid user credentials can escalate their access to full system control. This elevates the risk in environments where user credentials are weak, reused, or exposed through phishing or insider threats. The absence of known exploits in the wild currently provides a window for remediation, but the high severity score underscores the urgency of patching.

Mitigation Recommendations

Organizations should immediately upgrade FreePBX Endpoint Manager to version 17.0.3 or later, where this vulnerability is patched. Until patching is possible, restrict access to the FreePBX administrative interface to trusted networks and users only, employing network segmentation and firewall rules to limit exposure. Implement strong authentication controls, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Regularly audit user accounts and permissions to ensure that only necessary users have access to the administrative interface. Monitor system and application logs for unusual activity, especially commands executed by the 'asterisk' user or unexpected SSH connection attempts. Consider deploying host-based intrusion detection systems (HIDS) to detect anomalous command execution. Educate users about phishing and credential security to prevent initial account compromise. Finally, maintain up-to-date backups of telephony configurations and system states to enable rapid recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.028Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690d71c16e13fd093e3db3fd

Added to database: 11/7/2025, 4:12:49 AM

Last enriched: 2/27/2026, 3:51:19 PM

Last updated: 3/22/2026, 8:29:35 AM

Views: 157

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses