Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64328: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in FreePBX security-reporting

0
High
VulnerabilityCVE-2025-64328cvecve-2025-64328cwe-78
Published: Fri Nov 07 2025 (11/07/2025, 03:32:20 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: security-reporting

Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to obtain remote access to the system as an asterisk user. This issue is fixed in version 17.0.3.

AI-Powered Analysis

AILast updated: 02/03/2026, 08:05:18 UTC

Technical Analysis

CVE-2025-64328 is an OS command injection vulnerability classified under CWE-78 affecting the FreePBX Endpoint Manager module, specifically the filestore component within the administrative interface. The flaw exists in versions 17.0.2.36 through 17.0.3 (exclusive) and is triggered via the testconnection -> check_ssh_connect() function. An authenticated user with valid credentials can exploit this vulnerability by injecting malicious commands that the system executes without proper sanitization or neutralization of special characters. This leads to arbitrary command execution on the underlying operating system with the privileges of the 'asterisk' user, which typically has significant control over the telephony system. The vulnerability does not require additional user interaction and can be exploited remotely over the network. The CVSS v4.0 score of 8.6 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for user interaction. The flaw allows attackers to potentially take over telephony endpoints, intercept or manipulate calls, disrupt services, or pivot to other parts of the network. The issue has been addressed in FreePBX version 17.0.3, which includes proper input validation and command sanitization to prevent injection attacks.

Potential Impact

For European organizations, this vulnerability poses a significant risk to telephony infrastructure security and operational continuity. FreePBX is widely used in enterprise and service provider environments across Europe for managing VoIP endpoints and call routing. Exploitation could lead to unauthorized access to voice systems, interception or manipulation of calls, disruption of communication services, and potential lateral movement within corporate networks. This could impact confidentiality of sensitive communications, integrity of telephony configurations, and availability of critical voice services. Organizations in sectors such as finance, healthcare, government, and telecommunications are particularly vulnerable due to their reliance on secure and reliable telephony. Additionally, compromised systems could be leveraged for fraud, espionage, or denial of service attacks. The post-authentication requirement limits exposure somewhat but does not eliminate risk, especially in environments with weak credential management or insider threats.

Mitigation Recommendations

European organizations should immediately upgrade FreePBX Endpoint Manager to version 17.0.3 or later to apply the official patch that fixes the command injection vulnerability. Until patching is possible, restrict access to the administrative interface to trusted networks and users only, employing network segmentation and firewall rules to limit exposure. Implement strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Regularly audit user accounts and privileges to ensure only authorized personnel have access to the affected modules. Monitor system logs and network traffic for unusual SSH connection attempts or command execution patterns indicative of exploitation attempts. Employ intrusion detection/prevention systems tuned to detect command injection signatures. Conduct security awareness training to reduce insider threat risks. Finally, maintain up-to-date backups of telephony configurations and system states to enable rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.028Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690d71c16e13fd093e3db3fd

Added to database: 11/7/2025, 4:12:49 AM

Last enriched: 2/3/2026, 8:05:18 AM

Last updated: 2/7/2026, 2:01:22 AM

Views: 137

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats