You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "This module exploits an authenticated path traversal vulnerability in\n Xorcom CompletePBX <= 5.2.35. The issue occurs due to improper validation of the\n `systemDataFileName` parameter in the `diagnostics` module, allowing authenticated attackers\n to retrieve arbitrary files from the system.\n\n Additionally, the exploitation of this vulnerability results in the **deletion** of the\n requested file from the target system.\n\n The vulnerability is identified as CVE-2025-30005.",
"description": "This module exploits an authenticated file disclosure vulnerability in CompletePBX <= 5.2.35.\n The issue resides in the backup download function, where user input is not properly validated,\n allowing an attacker to access arbitrary files on the system as root.\n\n The vulnerability is triggered by setting the `backup` parameter to a Base64-encoded\n absolute file path, prefixed by a comma `,`. This results in the server exposing the\n file contents directly.",
"description": "This module exploits an authenticated command injection vulnerability in Xorcom CompletePBX\n versions <= 5.2.35. The issue resides in the task scheduler functionality, where user-controlled\n input is improperly sanitized, allowing arbitrary command execution with web server privileges.\n\n Only the superadmin user (admin) has the necessary permissions to trigger this exploit.\n Even when creating a new user with maximum privileges, the vulnerability does not work.",
0 commit comments