Xorcom CompletePBX is vulnerable to command injection in the administrator Task Scheduler functionality, allowing for attackers to execute arbitrary commands as the root user.




This issue affects CompletePBX: all versions up to and prior to 5.2.35
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 28 Dec 2025 02:00:00 +0900

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 23 Sep 2025 23:30:00 +0900

Type Values Removed Values Added
First Time appeared Xorcom
Xorcom completepbx
CPEs cpe:2.3:a:xorcom:completepbx:*:*:*:*:*:*:*:*
Vendors & Products Xorcom
Xorcom completepbx

Tue, 01 Apr 2025 04:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 02:00:00 +0900

Type Values Removed Values Added
Description Xorcom CompletePBX is vulnerable to command injection in the administrator Task Scheduler functionality, allowing for attackers to execute arbitrary commands as the root user. This issue affects CompletePBX: all versions up to and prior to 5.2.35
Title Xorcom CompletePBX <= 5.2.35 Task Scheduler Authenticated Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-27T16:47:39.968Z

Reserved: 2025-03-13T17:27:08.113Z

Link: CVE-2025-30004

cve-icon Vulnrichment

Updated: 2025-03-31T18:50:21.446Z

cve-icon NVD

Status : Modified

Published: 2025-03-31T17:15:41.737

Modified: 2025-12-27T17:15:47.593

Link: CVE-2025-30004

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses