Summary
Multiple command injection vulnerabilities exist in the recordings module.
Authentication with a known username is required.
Details
Authenticated AJAX endpoints allow user-supplied POST parameters (e.g. file, filenames[]) that are insufficiently sanitized and later passed into shell-executed operations via the Media handling subsystem. This allows command injection through crafted filename values.
Impact
The impact is that any user with access to the FreePBX Administration panel could leverage this vulnerability to execute arbitrary shell commands on the underlying host. An attacker could leverage this to obtain remote access to the system as the asterisk user.
Mitigations
- Update the
recordings module to the latest version.
- Ensure only authorized users have access to the FreePBX Administrator Control Panel e.g. by using the FreePBX User Management, SysAdmin VPN, MFA or SAML modules.
- Deny access from hostile networks to the ACP e.g. by using the FreePBX Firewall module.
Scoring
CVSS 4.0 Base vector string: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS 4.0 Base Threat Environment Supplemental vector string: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/R:U/V:D/RE:L/U:Green
Current CVSS-B v4.0 score: 8.6 (High)
Current CVSS-BTES v4.0 score: 6.1 (Medium)
Alternative CVSS-BTES v4.1 score: 0.9 (Low)
See details on scoring on the FreePBX blog at https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80/
History
This vulnerability was introduced around April-May 2025.
Summary
Multiple command injection vulnerabilities exist in the
recordingsmodule.Authentication with a known username is required.
Details
Authenticated AJAX endpoints allow user-supplied POST parameters (e.g.
file,filenames[]) that are insufficiently sanitized and later passed into shell-executed operations via the Media handling subsystem. This allows command injection through crafted filename values.Impact
The impact is that any user with access to the FreePBX Administration panel could leverage this vulnerability to execute arbitrary shell commands on the underlying host. An attacker could leverage this to obtain remote access to the system as the
asteriskuser.Mitigations
recordingsmodule to the latest version.Scoring
CVSS 4.0 Base vector string:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:NCVSS 4.0 Base Threat Environment Supplemental vector string:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/R:U/V:D/RE:L/U:GreenCurrent CVSS-B v4.0 score: 8.6 (High)
Current CVSS-BTES v4.0 score: 6.1 (Medium)
Alternative CVSS-BTES v4.1 score: 0.9 (Low)
See details on scoring on the FreePBX blog at https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80/
History
This vulnerability was introduced around April-May 2025.