No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 21 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freepbx
Freepbx api |
|
| Vendors & Products |
Freepbx
Freepbx api |
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FreePBX api module version 17.0.8 and prior contain a command injection vulnerability in the initiateGqlAPIProcess() function where GraphQL mutation input fields are passed directly to shell_exec() without sanitization or escaping. An authenticated user with a valid bearer token can send a GraphQL moduleOperations mutation with backtick-wrapped commands in the module field to execute arbitrary commands on the underlying host as the web server user. | |
| Title | FreePBX api module Command Injection via GraphQL | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-21T13:32:06.116Z
Reserved: 2026-04-13T20:29:02.810Z
Link: CVE-2026-40520
Updated: 2026-04-21T13:31:56.061Z
Status : Awaiting Analysis
Published: 2026-04-21T13:16:20.380
Modified: 2026-04-21T16:20:24.180
Link: CVE-2026-40520
No data.
OpenCVE Enrichment
Updated: 2026-04-21T16:30:40Z