Summary
Insufficiently sanitized user-supplied data allows unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution.
Details
Starting on or before August 21st, 2025, an unauthorized user began accessing multiple FreePBX version 16 and 17 systems that were connected directly to the public internet -- systems with inadequate IP filtering/ACLs -- by exploiting a validation/sanitization error in the processing of user-supplied input to the commercial "endpoint" module. This initial entry point was then chained with several other steps to ultimately gain potentially root level access on the target systems.
Mitigation
Users should upgrade to the latest supported versions of FreePBX (currently 15, 16, and 17) and confirm that the installed "endpoint" module meets the minimum patched versions. Systems not configured for automatic updates, or those wishing to manually update, can do so via the Administrator Control Panel menu Admin -> Module Admin or via generic command line method of updating all modules:
$ fwconsole ma upgradeall
Then checking for the "endpoint" module version number:
$ fwconsole ma list | grep endpoint
Further steps, including suggestions for IOC inspection and Firewall configuration, as well as corner-case considerations, are available in the FreePBX Community Forums under the "Security Advisory: Please Lock Down Your Administrator Access" topic at https://community.freepbx.org/t/security-advisory-please-lock-down-your-administrator-access/107203
Affected Versions
All supported versions of FreePBX: 15, 16, and 17.
EOL versions are untested for this vulnerability but may be affected. It is recommended to upgrade EOL versions to a supported version to ensure this vulnerability -- and potentially other published security vulnerabilities -- are not present.
Indicators Of Compromise
This is a summary of the current IOCs listed in the forum topic linked above as of this writing:
- File
/etc/freepbx.conf
recently modified or missing
- File
/var/www/html/.clean.sh
should not exist on normal systems
- POST requests to
modular.php
in web server logs likely not legitimate traffic
- Phone calls placed to extension 9998 in call logs and CDRs are unusual - unless previously configured
- Suspicious ampuser user in the ampusers database table or other unknown users
Summary
Insufficiently sanitized user-supplied data allows unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution.
Details
Starting on or before August 21st, 2025, an unauthorized user began accessing multiple FreePBX version 16 and 17 systems that were connected directly to the public internet -- systems with inadequate IP filtering/ACLs -- by exploiting a validation/sanitization error in the processing of user-supplied input to the commercial "endpoint" module. This initial entry point was then chained with several other steps to ultimately gain potentially root level access on the target systems.
Mitigation
Users should upgrade to the latest supported versions of FreePBX (currently 15, 16, and 17) and confirm that the installed "endpoint" module meets the minimum patched versions. Systems not configured for automatic updates, or those wishing to manually update, can do so via the Administrator Control Panel menu Admin -> Module Admin or via generic command line method of updating all modules:
$ fwconsole ma upgradeall
Then checking for the "endpoint" module version number:
$ fwconsole ma list | grep endpoint
Further steps, including suggestions for IOC inspection and Firewall configuration, as well as corner-case considerations, are available in the FreePBX Community Forums under the "Security Advisory: Please Lock Down Your Administrator Access" topic at https://community.freepbx.org/t/security-advisory-please-lock-down-your-administrator-access/107203
Affected Versions
All supported versions of FreePBX: 15, 16, and 17.
EOL versions are untested for this vulnerability but may be affected. It is recommended to upgrade EOL versions to a supported version to ensure this vulnerability -- and potentially other published security vulnerabilities -- are not present.
Indicators Of Compromise
This is a summary of the current IOCs listed in the forum topic linked above as of this writing:
/etc/freepbx.conf
recently modified or missing/var/www/html/.clean.sh
should not exist on normal systemsmodular.php
in web server logs likely not legitimate traffic