Impact
FreePBX api module versions up to 17.0.8 allow an authenticated user with a bearer token to inject shell commands into a GraphQL mutation. The vulnerable function directly passes the module field to shell_exec() without validation, enabling arbitrary command execution on the host as the web server user.
Affected Systems
The vulnerability affects FreePBX api module version 17.0.8 and earlier. Users running these versions should verify their installation of FreePBX and assess whether the GraphQL API is exposed to authenticated users.
Risk and Exploitability
The issue carries a CVSS score of 8.6, indicating high severity, and is not listed in the CISA KEV catalog. Although EPSS data is unavailable, the combination of a privilege-required authenticated attacker and the ability to run arbitrary commands suggests a significant risk of compromise for the underlying system.
OpenCVE Enrichment