CVE-2026-28210
Published: 05 March 2026
Summary
CVE-2026-28210 is a high-severity SQL Injection (CWE-89) vulnerability in Sangoma Freepbx. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and patching of the specific SQL injection flaw in the FreePBX CDR module affecting versions prior to 16.0.49 and 17.0.7.
Directly prevents SQL injection attacks by enforcing input validation and error handling for user-supplied data processed by the CDR module before SQL query construction.
Reduces the attack surface by applying least privilege to limit authenticated low-privilege user access to the vulnerable CDR module functions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in network-accessible FreePBX web app directly enables T1190 (public-facing exploitation); arbitrary SQL commands allow DB data extraction (T1213.006) and stored record modification (T1565.001).
NVD Description
FreePBX is an open source IP PBX. Prior to versions 16.0.49 and 17.0.7, FreePBX module cdr (Call Data Record) is vulnerable to SQL query injection. This issue has been patched in versions 16.0.49 and 17.0.7.
Deeper analysisAI
CVE-2026-28210 is a SQL query injection vulnerability (CWE-89) in the cdr (Call Data Record) module of FreePBX, an open source IP PBX software. The flaw affects FreePBX versions prior to 16.0.49 and 17.0.7, allowing malicious SQL queries to be injected through the module. It has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
An attacker with low privileges (PR:L), such as an authenticated user on the network-accessible system (AV:N), can exploit this vulnerability with low complexity (AC:L) and no user interaction required (UI:N). Successful exploitation enables high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), potentially allowing arbitrary SQL command execution to extract sensitive call data, modify records, or disrupt PBX operations.
The issue has been addressed in FreePBX versions 16.0.49 and 17.0.7, as detailed in the GitHub security advisory at https://github.com/FreePBX/security-reporting/security/advisories/GHSA-59gp-632h-c54v. Security practitioners should update to these patched versions and review access controls for the cdr module to mitigate risks.
Details
- CWE(s)