Summary
The filestore module within the Administrative interface is vulnerable to a post-authentication command injection via the testconnection -> check_ssh_connect() function.
Authentication with a known username is required.
Impact
The impact is that any user with access to the FreePBX Administration panel could leverage this vulnerability to execute arbitrary shell commands on the underlying host. An attacker could leverage this to obtain remote access to the system as the asterisk user.
Mitigations
- Update the
filestore module to the latest version.
- Ensure only authorized users have access to the FreePBX Administrator Control Panel.
- Deny access from hostile networks to the ACP e.g. by using the FreePBX Firewall module.
Scoring
CVSS 4.0 Base vector string: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS 4.0 Base Threat Environment Supplemental vector string: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/RE:L/U:Green
Current CVSS-B v4.0 score is 8.6 (High)
Current CVSS-BTES v4.0 score is 6.1 (Medium)
Alternative CVSS-BTES v4.1 score is 0.9 (Low)
See details on scoring on the FreePBX blog at https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80/
History
This vulnerability was introduced around March 2025.
https://github.com/FreePBX/filestore/blob/f0e3983059271efd80b483ec823310ef19a59013/drivers/SSH/testconnection.php#L2
Summary
The
filestoremodule within the Administrative interface is vulnerable to a post-authentication command injection via thetestconnection->check_ssh_connect()function.Authentication with a known username is required.
Impact
The impact is that any user with access to the FreePBX Administration panel could leverage this vulnerability to execute arbitrary shell commands on the underlying host. An attacker could leverage this to obtain remote access to the system as the
asteriskuser.Mitigations
filestoremodule to the latest version.Scoring
CVSS 4.0 Base vector string:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:NCVSS 4.0 Base Threat Environment Supplemental vector string:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/RE:L/U:GreenCurrent CVSS-B v4.0 score is 8.6 (High)
Current CVSS-BTES v4.0 score is 6.1 (Medium)
Alternative CVSS-BTES v4.1 score is 0.9 (Low)
See details on scoring on the FreePBX blog at https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80/
History
This vulnerability was introduced around March 2025.
https://github.com/FreePBX/filestore/blob/f0e3983059271efd80b483ec823310ef19a59013/drivers/SSH/testconnection.php#L2