CVE-2025-59051
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-14

Last updated on: 2025-10-16

Assigner: GitHub, Inc.

Description
The FreePBX Endpoint Manager module includes a Network Scanning feature that provides web-based access to nmap functionality for network device discovery. In Endpoint Manager 16 before 16.0.92 and 17 before 17.0.6, insufficiently sanitized user-supplied input allows authenticated OS command execution as the asterisk user. Authentication with a known username is required. Updating to Endpoint Manager 16.0.92 or 17.0.6 addresses the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-14
Last Modified
2025-10-16
Generated
2026-05-07
AI Q&A
2025-10-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
freepbx endpoint_manager 17
freepbx endpoint_manager 16
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-59051 is an authenticated command injection vulnerability in the Network Scanning feature of the FreePBX Endpoint Manager module. This feature uses web-based access to nmap for discovering network devices. Due to insufficient sanitization of user-supplied input, an authenticated attacker with known credentials can execute arbitrary operating system commands as the 'asterisk' user. This affects Endpoint Manager versions 16 before 16.0.92 and 17 before 17.0.6. The issue is fixed in versions 16.0.92 and 17.0.6 and later. [1]


How can this vulnerability impact me? :

This vulnerability allows an authenticated attacker to execute arbitrary OS commands with the privileges of the 'asterisk' user, potentially leading to unauthorized control over the affected system. It can compromise confidentiality and integrity of the system, allowing attackers to manipulate or access sensitive data and disrupt normal operations. The attack can be performed remotely over the network with low complexity and no user interaction required, making it a significant security risk. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by verifying if the FreePBX Endpoint Manager module is running a vulnerable version (16 before 16.0.92 or 17 before 17.0.6). Since the vulnerability involves authenticated OS command injection via the Network Scanning feature, detection could involve checking for unusual command execution or network scanning activity initiated from the web interface. Specific commands are not provided in the resources, but monitoring for unexpected 'nmap' executions or command injection attempts in logs related to the Endpoint Manager module could help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the FreePBX Endpoint Manager module to version 16.0.92 or 17.0.6 or later, restricting access to the Admin Control Panel (ACP) by removing unauthorized users, and firewalling HTTP/HTTPS/GraphQL ports of the FreePBX ACP to prevent unauthorized access. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart