CVE-2025-66039
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-09

Assigner: GitHub, Inc.

Description
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-09
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
freepbx endpoint_manager 16.0.44
freepbx endpoint_manager 17.0.23
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the FreePBX Endpoint Manager module when the authentication type is set to "webserver." It allows an attacker to bypass authentication by providing an Authorization header with any arbitrary value, which causes the system to associate a session with the target user without requiring valid credentials. This means unauthorized users can gain access to the system as if they were authenticated.


How can this vulnerability impact me? :

The vulnerability can allow unauthorized access to telephony endpoints managed by FreePBX Endpoint Manager. This could lead to unauthorized control or manipulation of telephony devices, potential interception or disruption of communications, and compromise of system integrity and confidentiality.


What immediate steps should I take to mitigate this vulnerability?

Upgrade FreePBX Endpoint Manager to version 16.0.44 or 17.0.23 or later, where the authentication bypass vulnerability has been fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart