CVE-2025-66039
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| freepbx | endpoint_manager | 16.0.44 |
| freepbx | endpoint_manager | 17.0.23 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the FreePBX Endpoint Manager module when the authentication type is set to "webserver." It allows an attacker to bypass authentication by providing an Authorization header with any arbitrary value, which causes the system to associate a session with the target user without requiring valid credentials. This means unauthorized users can gain access to the system as if they were authenticated.
How can this vulnerability impact me? :
The vulnerability can allow unauthorized access to telephony endpoints managed by FreePBX Endpoint Manager. This could lead to unauthorized control or manipulation of telephony devices, potential interception or disruption of communications, and compromise of system integrity and confidentiality.
What immediate steps should I take to mitigate this vulnerability?
Upgrade FreePBX Endpoint Manager to version 16.0.44 or 17.0.23 or later, where the authentication bypass vulnerability has been fixed.