← Retour aux CVEs
CVE-2026-40520
HIGH7.2
Description
FreePBX api module version 17.0.8 and prior contain a command injection vulnerability in the initiateGqlAPIProcess() function where GraphQL mutation input fields are passed directly to shell_exec() without sanitization or escaping. An authenticated user with a valid bearer token can send a GraphQL moduleOperations mutation with backtick-wrapped commands in the module field to execute arbitrary commands on the underlying host as the web server user.
Details CVE
Score CVSS v3.17.2
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisHIGH
Interaction utilisateurNONE
Publie4/21/2026
Derniere modification4/23/2026
Sourcenvd
Observations honeypot0
Produits affectes
freepbx:api
Faiblesses (CWE)
CWE-78
References
https://github.com/FreePBX/api/blob/5f194e39a47e5481e8947f9694304d32724175f6/Api.class.php#L546C1-L554C3(disclosure@vulncheck.com)
https://github.com/FreePBX/api/blob/5f194e39a47e5481e8947f9694304d32724175f6/ApiGqlHelper.class.php#L34C1-L36C136(disclosure@vulncheck.com)
https://github.com/FreePBX/api/commit/5f194e39a47e5481e8947f9694304d32724175f6(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/freepbx-api-module-command-injection-via-graphql(disclosure@vulncheck.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.