FreePBX 13.x < 13.0.197.14 / 14.x < 14.0.13.12 / 15.x < 15.0.16.27 Remote Admin Authentication Bypass

critical Nessus Plugin ID 298040

Synopsis

The remote web server hosts a PHP application that is affected by an authentication bypass vulnerability.

Description

The version of FreePBX installed on the remote host is 13.x prior to 13.0.197.14, 14.x prior to 14.0.13.12, or 15.x prior to 15.0.16.27. It is, therefore, affected by an authentication bypass vulnerability:

- Sangoma FreePBX has incorrect access control that allows unauthenticated remote attackers to bypass authentication and gain administrative access to the system. (CVE-2019-19006)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to FreePBX version 13.0.197.14, 14.0.13.12, 15.0.16.27, or later.

See Also

http://www.nessus.org/u?b187623d

Plugin Details

Severity: Critical

ID: 298040

File Name: freepbx_CVE-2019-19006.nasl

Version: 1.2

Type: remote

Family: CGI abuses

Published: 2/5/2026

Updated: 2/6/2026

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-19006

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:freepbx:freepbx

Required KB Items: installed_sw/FreePBX

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/20/2019

Vulnerability Publication Date: 11/20/2019

Reference Information

CVE: CVE-2019-19006