Description
FreePBX is an open source IP PBX. Prior to versions 16.0.49 and 17.0.7, FreePBX module cdr (Call Data Record) is vulnerable to SQL query injection. This issue has been patched in versions 16.0.49 and 17.0.7.
Published: 2026-03-05
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection enabling unauthorized data access
Action: Immediate Patch
AI Analysis

Impact

This vulnerability exists in the FreePBX Call Data Record (CDR) reporting module and allows an attacker with authenticated access to inject arbitrary SQL into queries that retrieve CDR data. The injection can lead to unauthorized reading of sensitive call records, modification or deletion of database entries, or other destructive actions. The weakness is a classic SQL Injection identified as CWE-89, which signals unsafe handling of untrusted input. Based on the description, it is inferred that the attacker must possess valid user credentials to exploit this flaw.

Affected Systems

Any installation of FreePBX running a version prior to 16.0.49 or 17.0.7 is affected. The vulnerability resides in the FreePBX CDR module and is exposed through the CDR reporting interface. Systems using older FreePBX releases—particularly those including the security-reporting component—must verify their version and apply fixes if necessary.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity overall. With an EPSS below 1% and no current listing in the CISA KEV catalog, the likelihood of widespread exploitation is low, but the remaining factors—namely the requirement for authenticated access and the vulnerable database interface—mean that a knowledgeable attacker could discover and exploit the flaw. The likely attack vector is through the CDR reporting feature, and it is inferred that the attacker must have valid user credentials with access to this feature. Once authenticated, the attacker could manipulate the SQL query parameter to extract or alter data.

Generated by OpenCVE AI on April 17, 2026 at 12:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FreePBX to version 16.0.49 or later, or 17.0.7 or later, which addresses the injection flaw.
  • Restrict access to the CDR reporting feature so that only trusted, privileged users can use it while the update is pending.
  • Conduct a database backup before applying the update to preserve data integrity.

Generated by OpenCVE AI on April 17, 2026 at 12:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Sangoma
Sangoma freepbx
CPEs cpe:2.3:a:sangoma:freepbx:*:*:*:*:*:*:*:*
Vendors & Products Sangoma
Sangoma freepbx
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 06 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Freepbx
Freepbx security-reporting
Vendors & Products Freepbx
Freepbx security-reporting

Thu, 05 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description FreePBX is an open source IP PBX. Prior to versions 16.0.49 and 17.0.7, FreePBX module cdr (Call Data Record) is vulnerable to SQL query injection. This issue has been patched in versions 16.0.49 and 17.0.7.
Title FreePBX: Authenticated SQL Injection in CDR (Call Data Record) Reports
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Freepbx Security-reporting
Sangoma Freepbx
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-07T04:55:28.948Z

Reserved: 2026-02-25T15:28:40.648Z

Link: CVE-2026-28210

cve-icon Vulnrichment

Updated: 2026-03-06T15:58:36.186Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T19:16:14.713

Modified: 2026-03-06T18:41:03.417

Link: CVE-2026-28210

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:45:16Z

Weaknesses