Xorcom CompletePBX is vulnerable to command injection in the administrator Task Scheduler functionality, allowing for attackers to execute arbitrary commands as the root user.
This issue affects CompletePBX: all versions up to and prior to 5.2.35
References
Link | Resource |
---|---|
https://vulncheck.com/advisories/completepbx-authenticated-command-injection | Third Party Advisory |
https://www.xorcom.com/new-completepbx-release-5-2-36-1/ | Release Notes |
Configurations
History
23 Sep 2025, 14:27
Type | Values Removed | Values Added |
---|---|---|
First Time |
Xorcom completepbx
Xorcom |
|
References | () https://vulncheck.com/advisories/completepbx-authenticated-command-injection - Third Party Advisory | |
References | () https://www.xorcom.com/new-completepbx-release-5-2-36-1/ - Release Notes | |
Summary |
|
|
CPE | cpe:2.3:a:xorcom:completepbx:*:*:*:*:*:*:*:* |
31 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-31 17:15
Updated : 2025-09-23 14:27
NVD link : CVE-2025-30004
Mitre link : CVE-2025-30004
CVE.ORG link : CVE-2025-30004
JSON object : View
Products Affected
xorcom
- completepbx
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')