CVE-2025-64328

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-64328
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64328.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-64328
Aliases
  • GHSA-vm9p-46mv-5xvw
Published
2025-11-07T03:32:20.670Z
Modified
2025-12-05T10:21:33.514593Z
Severity
  • 8.6 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
FreePBX Administration GUI is Vulnerable to Authenticated Command Injection
Details

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> checksshconnect() function. An attacker can leverage this vulnerability to obtain remote access to the system as an asterisk user. This issue is fixed in version 17.0.3.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64328.json",
    "cwe_ids": [
        "CWE-78"
    ]
}
References

Affected packages

Git / github.com/freepbx/filestore

Affected ranges

Type
GIT
Repo
https://github.com/freepbx/filestore
Events

Affected versions

release/17.*

release/17.0.2.36
release/17.0.2.37
release/17.0.2.38
release/17.0.2.39
release/17.0.2.40
release/17.0.2.41
release/17.0.2.42
release/17.0.2.43
release/17.0.2.44