Description
XSS in app/operator_panel/index_inc.php in the Operator Panel module in FusionPBX 4.4.3 allows remote unauthenticated attackers to inject arbitrary JavaScript characters by placing a phone call using a specially crafted caller ID number. This can further lead to remote code execution by chaining this vulnerability with a command injection vulnerability also present in FusionPBX.
Exploits (1)
nomisec
WORKING POC
by HoseynHeydari · poc
https://github.com/HoseynHeydari/fusionpbx_rce_vulnerability
References (3)
Core 3
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/fusionpbx/fusionpbx/commit/391a23d070f3036d0c7760992f6970b0a76ee4d7
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/153256/FusionPBX-4.4.3-Remote-Command-Execution.html
Exploit, Third Party Advisory x_refsource_misc
https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html
Scores
CVSS v3
6.1
EPSS
0.0192
EPSS Percentile
83.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (1)
fusionpbx/fusionpbx
4.4.3
Published
Jun 17, 2019
Tracked Since
Feb 18, 2026