Page tree
Skip to end of metadata
Go to start of metadata




A Remote Command Execution vulnerability that results in Privileged Escalation exists in FreePBX 13 and FreePBX 14 with ‘Recordings’ and 'Hotel Wakeup':

  • Hotel Wakeup Modules versions:
    • 13.0.1alpha2 and 13.0.14
  • System Recordings Module versions:
    • 13.0.1beta1 through 13.0.26

This has been fixed in Recordings 13.0.27 and Hotel Wakeup 13.0.15

Discovered By:

Adrian Maertins <adrian(dot)maertins(at)gmail(at)com>


CVSS 3 Details:

  • Base Score: 10
  • Temporal Score: 9.5
  • Environmental Score: 9.5



Vulnerable software and versions:

  • FreePBX System Recordings module, between August 2015  (13.0.1beta1) and August 2016 (13.0.26).
  • FreePBX Hotel Wakeup module, between May 2015 (13.0.1alpha2) and August 2016 (13.0.14)

Note that FreePBX 12 and earlier are not affected.

  • This has been fixed in Recordings versions 13.0.27 and higher
  • This has been fixed in Hotel Wakeup versions 13.0.15 and higher

Related Information

Official Bug ticket :  FREEPBX-12908 - Getting issue details... STATUS

Further Details:

The recordings module lets you playback recorded files. Due to a coding error, certain Ajax requests were unauthenticated when requesting files. This allowed shell execution and privileged escalation if triggered correctly.

This has been fixed in Recordings 13.0.27

The Sangoma and FreePBX team has deemed this a serious security issue, the exploit has not been released into the wild but we have immediately released a patch to resolve it. We strongly encourage all users of FreePBX 13 & 14 to upgrade to the latest framework version. This can be done from the Module Admin GUI or fwconsole. For more information on using Module Admin, please see

Sangoma takes security seriously and request that any future FreePBX security issue be reported at [email protected].


If you are running a vulnerable version of the FreePBX 13, 14 System Recordings Module and are unable to upgrade, make sure that your Admin interface is not accessible from the open Internet.

  • No labels