CVE-2025-55209
BaseFortify
Publication date: 2025-09-04
Last updated on: 2025-09-05
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| freepbx | freepbx | 15.0.14 |
| freepbx | freepbx | 16.0.27 |
| freepbx | freepbx | 17.0.6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stored cross-site scripting (XSS) issue in the contactmanager module of FreePBX. It allows a low-privileged User Control Panel (UCP) user to inject malicious JavaScript code into the system. When an administrator interacts with the affected component, the malicious code executes in their context, potentially leading to session hijacking and privilege escalation.
How can this vulnerability impact me? :
The vulnerability can lead to session hijacking of administrator accounts and potential privilege escalation. This means an attacker with low privileges could gain higher-level access and control over the system, compromising its security and integrity.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately upgrade FreePBX contactmanager module to version 15.0.14, 16.0.27, or 17.0.6 or later, as these versions contain the fix for the stored cross-site scripting (XSS) vulnerability.