Description
In FusionPBX up to 4.5.7, the file app\destinations\destination_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS.
References (2)
Core 2
Core References
Patch x_refsource_misc
https://github.com/fusionpbx/fusionpbx/commit/d6ea02d896b2c57dec491ee3b36ec102639270be
Third Party Advisory x_refsource_misc
https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-xss-9/
Scores
CVSS v3
6.1
EPSS
0.0033
EPSS Percentile
55.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (1)
fusionpbx/fusionpbx
< 4.5.7
Published
Oct 23, 2019
Tracked Since
Feb 18, 2026