<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Security-Reporting Cdr (FreePBX 17) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/security-reporting-cdr-freepbx-17/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 15:15:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/security-reporting-cdr-freepbx-17/feed.xml" rel="self" type="application/rss+xml"/><item><title>FreePBX Security Advisories for Security-Reporting Module Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-05-freepbx-vulns/</link><pubDate>Wed, 20 May 2026 15:15:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-freepbx-vulns/</guid><description>FreePBX released security advisories addressing authenticated SQL injection and local file inclusion vulnerabilities in the Security-Reporting cdr and dashboard modules for FreePBX 16 and 17.</description><content:encoded><![CDATA[<p>On May 19, 2026, FreePBX published security advisories to address vulnerabilities affecting the Security-Reporting cdr and dashboard modules in FreePBX versions 16 and 17. These vulnerabilities include an authenticated SQL Injection vulnerability (GHSA-p9fq-fmpw-2h9x) in the CDR reports due to insufficient input sanitization in the ORDER BY clause and an authenticated Local File Inclusion (LFI) vulnerability (GHSA-hw7v-v2jp-wc4v) in the dashboard module. Successful exploitation of these vulnerabilities could allow an authenticated attacker to execute arbitrary SQL queries or read sensitive files on the server. FreePBX versions affected are Security-Reporting cdr (FreePBX 16) versions 16.0.50 and prior, Security-Reporting cdr (FreePBX 17) versions 17.0.11 and prior, Security-Reporting dashboard (FreePBX 16) versions 16.0.22 and prior, and Security-Reporting dashboard (FreePBX 17) versions 17.0.5 and prior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the FreePBX web interface using valid credentials.</li>
<li>For SQL Injection (GHSA-p9fq-fmpw-2h9x), the attacker navigates to the CDR Reports section of the Security-Reporting cdr module.</li>
<li>The attacker crafts a malicious SQL payload within the ORDER BY parameter of the CDR report request. This could involve injecting SQL code into the <code>sort</code> parameter.</li>
<li>The application executes the attacker-controlled SQL query against the FreePBX database.</li>
<li>The attacker extracts sensitive information from the database, potentially including user credentials or call records.</li>
<li>For Local File Inclusion (GHSA-hw7v-v2jp-wc4v), the attacker accesses the Dashboard module.</li>
<li>The attacker manipulates input parameters to include directory traversal sequences, such as &ldquo;../&rdquo;, to access arbitrary files on the system.</li>
<li>The attacker retrieves sensitive files, such as configuration files or private keys, from the FreePBX server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to unauthorized access to sensitive information, including database credentials, call records, and system files. An attacker could potentially use the SQL injection vulnerability to gain complete control over the FreePBX database, leading to data breaches or service disruption. The LFI vulnerability could expose sensitive configuration files or private keys, potentially allowing the attacker to compromise the entire system. The number of affected systems depends on the deployment size of vulnerable FreePBX installations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary updates provided by FreePBX to patch the SQL Injection (GHSA-p9fq-fmpw-2h9x) and Local File Inclusion (GHSA-hw7v-v2jp-wc4v) vulnerabilities in the Security-Reporting cdr and dashboard modules.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection attempts or directory traversal sequences targeting the affected FreePBX modules.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection and LFI vulnerabilities in web applications.</li>
<li>Deploy the Sigma rule for suspicious ORDER BY clauses in web requests to detect potential SQL injection attempts.</li>
<li>Review access controls to the FreePBX web interface and limit access to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>freepbx</category><category>sql_injection</category><category>lfi</category><category>vulnerability</category></item></channel></rss>