Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freepbx
Freepbx endpoint Manager |
|
| Vendors & Products |
Freepbx
Freepbx endpoint Manager |
Tue, 14 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The FreePBX Endpoint Manager module includes a Network Scanning feature that provides web-based access to nmap functionality for network device discovery. In Endpoint Manager 16 before 16.0.92 and 17 before 17.0.6, insufficiently sanitized user-supplied input allows authenticated OS command execution as the asterisk user. Authentication with a known username is required. Updating to Endpoint Manager 16.0.92 or 17.0.6 addresses the issue. | |
| Title | FreePBX Endpoint Manager command injection via Network Scanning feature | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-13T21:59:27.391Z
Reserved: 2025-09-08T16:19:26.172Z
Link: CVE-2025-59051
Updated: 2025-10-14T19:28:25.646Z
Status : Deferred
Published: 2025-10-14T20:15:43.193
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-59051
No data.
OpenCVE Enrichment
Updated: 2025-10-20T13:29:56Z