๐Ÿ” CVE Alert

CVE-2026-26978

UNKNOWN 0.0

Free PBX backup: Deserialization of Untrusted Data in admin/modules/backup/Models/BackupSplFileInfo.php

CVSS Score
0.0
EPSS Score
0.5%
EPSS Percentile
65th

FreePBX is an open source IP PBX. In versions below 16.0.71 and 17.0.6, the backup module does not properly sanitize data during restore operations, potentially leading to compromise if the backup contains carefully crafted hostile data. During backup restore operations, FreePBX extracts selected files from a user-supplied tar archive. If a malicious file exists in the archive, it is read and passed directly to unserialize() without validation, class restrictions, or integrity checks. This issue allows Remote Code Execution during restoration of the backup as the web server user (typically asterisk or www-data). The attack does not require shell access, CLI access, or filesystem write permissions beyond the normal restore workflow. Authentication with a known username that has sufficient access permissions and/or write access to backup files is required. This issue has been fixed in versions 16.0.71 and 17.0.6.

CWE CWE-502
Vendor freepbx
Product security-reporting
Published May 18, 2026
Last Updated May 20, 2026
Stay Ahead of the Next One

Get instant alerts for freepbx security-reporting

Be the first to know when new unknown vulnerabilities affecting freepbx security-reporting are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

FreePBX / security-reporting
< 16.0.71 >= 17.0.0, < 17.0.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/FreePBX/security-reporting/security/advisories/GHSA-5v7h-49gr-jcwr github.com: https://github.com/FreePBX/backup/commit/45c57e1207cbf9fd1c5f76f8a3e72d204a69a472 github.com: https://github.com/FreePBX/backup/commit/64781af5c80cce0cff21a981be4d8e6a7a71f2c4