Xorcom CompletePBX is vulnerable to command injection in the administrator Task Scheduler functionality, allowing for attackers to execute arbitrary commands as the root user.
This issue affects CompletePBX: all versions up to and prior to 5.2.35
References
| Link | Resource |
|---|---|
| https://vulncheck.com/advisories/completepbx-authenticated-command-injection | Third Party Advisory |
| https://www.xorcom.com/new-completepbx-release-5-2-36-1/ | Release Notes |
Configurations
History
23 Sep 2025, 14:27
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://vulncheck.com/advisories/completepbx-authenticated-command-injection - Third Party Advisory | |
| References | () https://www.xorcom.com/new-completepbx-release-5-2-36-1/ - Release Notes | |
| Summary |
|
|
| CPE | cpe:2.3:a:xorcom:completepbx:*:*:*:*:*:*:*:* | |
| First Time |
Xorcom completepbx
Xorcom |
31 Mar 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-31 17:15
Updated : 2025-09-23 14:27
NVD link : CVE-2025-30004
Mitre link : CVE-2025-30004
CVE.ORG link : CVE-2025-30004
JSON object : View
Products Affected
xorcom
- completepbx
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
