Description
FreePBX is an open source IP PBX. From versions 16.0.17.2 to before 16.0.20 and from version 17.0.2.4 to before 17.0.5, a command injection vulnerability exists in FreePBX when using the ElevenLabs Text-to-Speech (TTS) engine in the recordings module. This issue has been patched in versions 16.0.20 and 17.0.5.
Published: 2026-03-05
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

FreePBX contains a command injection flaw in the ElevenLabs Text-to-Speech (TTS) integration within the recordings module, enabling attackers to run arbitrary system commands on the server. The vulnerability would allow full compromise of the affected FreePBX instance, giving attackers complete read, modify and execute capabilities. The weakness is consistent with CWE‑78, highlighting improper handling of system commands without proper sanitization. The impact is therefore Local Integrity and Confidentiality loss, with possible Remote Code Execution when an attacker succeeds.

Affected Systems

The issue affects the FreePBX platform under the FreePBX:security‑reporting vendor. All releases between 16.0.17.2 and the year‑end of 16.0.19, and between 17.0.2.4 and 17.0.4 are vulnerable. Versions 16.0.20 and later, and 17.0.5 and later include the patch that eliminates the injection point.

Risk and Exploitability

The CVSS score of 7.5 conveys a high severity, while the EPSS assessment of less than 1% suggests that active exploitation is currently unlikely at scale, and the vulnerability is not listed in the CISA KEV catalog. However, the flaw can be leveraged once an attacker gains authenticated access to the recordings configuration or can interact with the TTS interface, which is often exposed over the web to privileged users. The likely attack path is remote control via the web interface that passes unsanitized arguments to the elevenlabs integration. Given the high severity and the potential for full system takeover, any user who can run the TTS function must consider this a critical risk.

Generated by OpenCVE AI on April 16, 2026 at 12:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FreePBX to at least version 16.0.20 or 17.0.5, which contain the full fix for the command injection point.
  • If upgrading immediately is not feasible, disable the ElevenLabs Text-to-Speech integration in the recordings module until the patch is applied.
  • Ensure that only trusted administrators have access to the recordings configuration to prevent unauthorized injection attempts.

Generated by OpenCVE AI on April 16, 2026 at 12:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Sangoma
Sangoma freepbx
CPEs cpe:2.3:a:sangoma:freepbx:*:*:*:*:*:*:*:*
Vendors & Products Sangoma
Sangoma freepbx
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Fri, 06 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Freepbx
Freepbx security-reporting
Vendors & Products Freepbx
Freepbx security-reporting

Thu, 05 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description FreePBX is an open source IP PBX. From versions 16.0.17.2 to before 16.0.20 and from version 17.0.2.4 to before 17.0.5, a command injection vulnerability exists in FreePBX when using the ElevenLabs Text-to-Speech (TTS) engine in the recordings module. This issue has been patched in versions 16.0.20 and 17.0.5.
Title FreePBX: Command Injection leading to Remote Code Execution in FreePBX ElevenLabs Text-to-Speech integration
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 7.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Freepbx Security-reporting
Sangoma Freepbx
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-07T04:55:26.005Z

Reserved: 2026-02-25T15:28:40.648Z

Link: CVE-2026-28209

cve-icon Vulnrichment

Updated: 2026-03-06T15:58:38.130Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T19:16:14.560

Modified: 2026-03-06T18:45:06.470

Link: CVE-2026-28209

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:30:06Z

Weaknesses