FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 11 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 11 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Freepbx
Freepbx endpoint Manager
Vendors & Products Freepbx
Freepbx endpoint Manager

Wed, 10 Dec 2025 22:45:00 +0000

Type Values Removed Values Added
Description FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Title FreePBX Endpoint Manager's Weak Default Password Allows Unauthenticated Access in Endpoint Module REST API
Weaknesses CWE-521
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-11T15:37:44.757Z

Reserved: 2025-12-08T21:46:24.993Z

Link: CVE-2025-67513

cve-icon Vulnrichment

Updated: 2025-12-11T15:37:42.324Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-10T23:15:49.140

Modified: 2025-12-12T15:18:13.390

Link: CVE-2025-67513

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-11T15:16:26Z

Weaknesses