FreePBX 16 contains an authenticated remote code execution vulnerability in the API module that allows attackers with valid session credentials to execute arbitrary commands. Attackers can exploit the 'generatedocs' endpoint by crafting malicious POST requests with bash command injection to establish remote shell access.
History

Tue, 16 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 15 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Sangoma
Sangoma freepbx
CPEs cpe:2.3:a:sangoma:freepbx:16.0:*:*:*:*:*:*:*
Vendors & Products Sangoma
Sangoma freepbx
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Freepbx
Freepbx freepbx
Vendors & Products Freepbx
Freepbx freepbx

Thu, 11 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description FreePBX 16 contains an authenticated remote code execution vulnerability in the API module that allows attackers with valid session credentials to execute arbitrary commands. Attackers can exploit the 'generatedocs' endpoint by crafting malicious POST requests with bash command injection to establish remote shell access.
Title FreePBX 16 Authenticated Remote Code Execution via API Module
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-16T16:31:37.417Z

Reserved: 2025-12-11T00:58:28.456Z

Link: CVE-2024-58294

cve-icon Vulnrichment

Updated: 2025-12-16T16:21:04.131Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-11T22:15:50.423

Modified: 2025-12-15T17:10:56.713

Link: CVE-2024-58294

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-12T08:49:07Z