{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-58294","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-12-11T00:58:28.456Z","datePublished":"2025-12-11T21:36:11.213Z","dateUpdated":"2026-04-07T14:08:42.482Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"FreePBX","vendor":"FreePBX","versions":[{"status":"affected","version":"16"}]}],"credits":[{"lang":"en","type":"finder","value":"Cold z3ro"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>FreePBX 16 contains an authenticated remote code execution vulnerability in the API module that allows attackers with valid session credentials to execute arbitrary commands. Attackers can exploit the 'generatedocs' endpoint by crafting malicious POST requests with bash command injection to establish remote shell access.</p>"}],"value":"FreePBX 16 contains an authenticated remote code execution vulnerability in the API module that allows attackers with valid session credentials to execute arbitrary commands. Attackers can exploit the 'generatedocs' endpoint by crafting malicious POST requests with bash command injection to establish remote shell access."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.7,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-04-07T14:08:42.482Z"},"references":[{"name":"ExploitDB-52031","tags":["exploit"],"url":"https://www.exploit-db.com/exploits/52031"},{"name":"Official Product Homepage","tags":["product"],"url":"https://www.freepbx.org/"},{"name":"Original Video Link","tags":["product"],"url":"https://www.youtube.com/watch?v=rqFJ0BxwlLI"},{"name":"VulnCheck Advisory: FreePBX 16 Authenticated Remote Code Execution via API Module","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/freepbx-authenticated-remote-code-execution-via-api-module"}],"source":{"discovery":"UNKNOWN"},"title":"FreePBX 16 Authenticated Remote Code Execution via API Module","x_generator":{"engine":"vulncheck"},"datePublic":"2024-06-01T00:00:00.000Z"},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-16T16:21:00.487251Z","id":"CVE-2024-58294","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-16T16:31:37.417Z"}}]}}