← Volver a CVEs
CVE-2026-40520
HIGH7.2
Descripcion
FreePBX api module version 17.0.8 and prior contain a command injection vulnerability in the initiateGqlAPIProcess() function where GraphQL mutation input fields are passed directly to shell_exec() without sanitization or escaping. An authenticated user with a valid bearer token can send a GraphQL moduleOperations mutation with backtick-wrapped commands in the module field to execute arbitrary commands on the underlying host as the web server user.
Detalles CVE
Puntuacion CVSS v3.17.2
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosHIGH
Interaccion usuarioNONE
Publicado4/21/2026
Ultima modificacion4/23/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
freepbx:api
Debilidades (CWE)
CWE-78
Referencias
https://github.com/FreePBX/api/blob/5f194e39a47e5481e8947f9694304d32724175f6/Api.class.php#L546C1-L554C3(disclosure@vulncheck.com)
https://github.com/FreePBX/api/blob/5f194e39a47e5481e8947f9694304d32724175f6/ApiGqlHelper.class.php#L34C1-L36C136(disclosure@vulncheck.com)
https://github.com/FreePBX/api/commit/5f194e39a47e5481e8947f9694304d32724175f6(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/freepbx-api-module-command-injection-via-graphql(disclosure@vulncheck.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.