Description
In FusionPBX up to 4.5.7, the file app\extensions\extension_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS.
References (2)
Core 2
Core References
Patch x_refsource_misc
https://github.com/fusionpbx/fusionpbx/commit/fc8e4e2d278ce6bffff21b04248d469a59eb8cd4
Third Party Advisory x_refsource_misc
https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-xss-10/
Scores
CVSS v3
6.1
EPSS
0.0033
EPSS Percentile
55.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (1)
fusionpbx/fusionpbx
< 4.5.7
Published
Oct 23, 2019
Tracked Since
Feb 18, 2026