Description
app/call_centers/cmd.php in the Call Center Queue Module in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated attackers (with at least the permission call_center_queue_add or call_center_queue_edit) to execute any commands on the host as www-data.
References (2)
Core 2
Core References
Patch x_refsource_misc
https://github.com/fusionpbx/fusionpbx/commit/2f9e591a4034c3aea70185dcab837946096449bf
Third Party Advisory x_refsource_misc
https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-sofia-api-command-injection-1/
Scores
CVSS v3
8.8
EPSS
0.0345
EPSS Percentile
87.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (1)
fusionpbx/fusionpbx
< 4.5.7
Published
Oct 21, 2019
Tracked Since
Feb 18, 2026