Description
Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.2 and 2.6.0rc2, and possibly other versions, allow remote attackers to inject arbitrary web script or HTML via the (1) tech parameter to admin/admin/config.php during a trunks display action, the (2) description parameter during an Add Zap Channel action, and (3) unspecified vectors during an Add Recordings action.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Global-Evolution · textwebappsphp
https://www.exploit-db.com/exploits/33443
exploitdb
WORKING POC
VERIFIED
by Global-Evolution · textwebappsphp
https://www.exploit-db.com/exploits/33442
exploitdb
WORKING POC
VERIFIED
by Global-Evolution · textwebappsphp
https://www.exploit-db.com/exploits/10645
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/61357
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/55054
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/10645
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/37972
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/55053
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/61358
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/37482
Scores
EPSS
0.0215
EPSS Percentile
84.3%
Details
CWE
CWE-79
Status
published
Products (2)
freepbx/freepbx
2.5.2
freepbx/freepbx
2.6.0 rc2
Published
Dec 30, 2009
Tracked Since
Feb 18, 2026