← Back to CVEs
CVE-2026-40520
HIGH7.2
Description
FreePBX api module version 17.0.8 and prior contain a command injection vulnerability in the initiateGqlAPIProcess() function where GraphQL mutation input fields are passed directly to shell_exec() without sanitization or escaping. An authenticated user with a valid bearer token can send a GraphQL moduleOperations mutation with backtick-wrapped commands in the module field to execute arbitrary commands on the underlying host as the web server user.
CVE Details
CVSS v3.1 Score7.2
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published4/21/2026
Last Modified4/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
freepbx:api
Weaknesses (CWE)
CWE-78
References
https://github.com/FreePBX/api/blob/5f194e39a47e5481e8947f9694304d32724175f6/Api.class.php#L546C1-L554C3(disclosure@vulncheck.com)
https://github.com/FreePBX/api/blob/5f194e39a47e5481e8947f9694304d32724175f6/ApiGqlHelper.class.php#L34C1-L36C136(disclosure@vulncheck.com)
https://github.com/FreePBX/api/commit/5f194e39a47e5481e8947f9694304d32724175f6(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/freepbx-api-module-command-injection-via-graphql(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.