Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28209: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in FreePBX security-reporting

0
High
VulnerabilityCVE-2026-28209cvecve-2026-28209cwe-78
Published: Thu Mar 05 2026 (03/05/2026, 18:22:38 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: security-reporting

Description

FreePBX is an open source IP PBX. From versions 16.0.17.2 to before 16.0.20 and from version 17.0.2.4 to before 17.0.5, a command injection vulnerability exists in FreePBX when using the ElevenLabs Text-to-Speech (TTS) engine in the recordings module. This issue has been patched in versions 16.0.20 and 17.0.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/12/2026, 20:09:05 UTC

Technical Analysis

CVE-2026-28209 is an OS command injection vulnerability classified under CWE-78 found in the FreePBX open-source IP PBX system, specifically within its security-reporting module when integrated with the ElevenLabs Text-to-Speech (TTS) engine in the recordings module. The vulnerability exists in FreePBX versions 16.0.17.2 through 16.0.19.x and 17.0.2.4 through 17.0.4.x. It arises because the application fails to properly sanitize or neutralize special characters or elements in user-supplied input that is passed to operating system commands. This improper neutralization allows an attacker with authenticated high-level privileges to inject and execute arbitrary OS commands on the underlying server. The vulnerability does not require user interaction beyond authentication but does require privileges, limiting exploitation to authorized users or those who can escalate privileges. The impact spans confidentiality, integrity, and availability, as arbitrary command execution can lead to data theft, system compromise, or denial of service. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial authentication required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported, the presence of this vulnerability in widely deployed FreePBX versions presents a significant risk. The issue has been addressed and patched in FreePBX versions 16.0.20 and 17.0.5, and users are strongly advised to upgrade to these or later versions.

Potential Impact

The vulnerability allows an authenticated user with high privileges to execute arbitrary OS commands, potentially leading to full system compromise. This can result in unauthorized access to sensitive call data, interception or manipulation of telephony functions, disruption of voice services, and potential lateral movement within the network. Organizations relying on FreePBX for critical telephony infrastructure may face service outages, data breaches, and reputational damage. Given FreePBX's widespread use in enterprises, call centers, and government agencies, exploitation could disrupt business communications and expose confidential information. The requirement for authentication limits remote exploitation by unauthenticated attackers but does not eliminate risk from insider threats or compromised credentials. The high impact on confidentiality, integrity, and availability underscores the critical nature of timely patching.

Mitigation Recommendations

1. Immediately upgrade FreePBX installations to version 16.0.20 or 17.0.5 or later to apply the official patches addressing this vulnerability. 2. Restrict access to the FreePBX administrative interface to trusted networks and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 3. Monitor system logs and command execution traces for unusual activity indicative of command injection attempts or unauthorized access. 4. Implement network segmentation to isolate telephony infrastructure from general user networks, limiting lateral movement if compromise occurs. 5. Regularly audit user privileges and remove unnecessary high-level access to minimize the number of users who can exploit this vulnerability. 6. Consider deploying application-layer firewalls or intrusion detection/prevention systems capable of detecting command injection patterns targeting FreePBX. 7. Maintain up-to-date backups of configuration and call data to enable rapid recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T15:28:40.648Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a9d16b61e8e69ef5d12483

Added to database: 3/5/2026, 6:54:35 PM

Last enriched: 3/12/2026, 8:09:05 PM

Last updated: 4/19/2026, 2:52:49 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses