CVE-2025-59051
BaseFortify
Publication date: 2025-10-14
Last updated on: 2025-10-16
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| freepbx | endpoint_manager | 17 |
| freepbx | endpoint_manager | 16 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-59051 is an authenticated command injection vulnerability in the Network Scanning feature of the FreePBX Endpoint Manager module. This feature uses web-based access to nmap for discovering network devices. Due to insufficient sanitization of user-supplied input, an authenticated attacker with known credentials can execute arbitrary operating system commands as the 'asterisk' user. This affects Endpoint Manager versions 16 before 16.0.92 and 17 before 17.0.6. The issue is fixed in versions 16.0.92 and 17.0.6 and later. [1]
How can this vulnerability impact me? :
This vulnerability allows an authenticated attacker to execute arbitrary OS commands with the privileges of the 'asterisk' user, potentially leading to unauthorized control over the affected system. It can compromise confidentiality and integrity of the system, allowing attackers to manipulate or access sensitive data and disrupt normal operations. The attack can be performed remotely over the network with low complexity and no user interaction required, making it a significant security risk. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by verifying if the FreePBX Endpoint Manager module is running a vulnerable version (16 before 16.0.92 or 17 before 17.0.6). Since the vulnerability involves authenticated OS command injection via the Network Scanning feature, detection could involve checking for unusual command execution or network scanning activity initiated from the web interface. Specific commands are not provided in the resources, but monitoring for unexpected 'nmap' executions or command injection attempts in logs related to the Endpoint Manager module could help detect exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the FreePBX Endpoint Manager module to version 16.0.92 or 17.0.6 or later, restricting access to the Admin Control Panel (ACP) by removing unauthorized users, and firewalling HTTP/HTTPS/GraphQL ports of the FreePBX ACP to prevent unauthorized access. [1]