CVE-2026-26978
Description
FreePBX is an open source IP PBX. In versions below 16.0.71 and 17.0.6, the backup module does not properly sanitize data during restore operations, potentially leading to compromise if the backup contains carefully crafted hostile data. During backup restore operations, FreePBX extracts selected files from a user-supplied tar archive. If a malicious file exists in the archive, it is read and passed directly to unserialize() without validation, class restrictions, or integrity checks. This issue allows Remote Code Execution during restoration of the backup as the web server user (typically asterisk or www-data). The attack does not require shell access, CLI access, or filesystem write permissions beyond the normal restore workflow. Authentication with a known username that has sufficient access permissions and/or write access to backup files is required. This issue has been fixed in versions 16.0.71 and 17.0.6.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
FreePBX backup module deserializes untrusted data during restore, allowing authenticated RCE as the web server user.
Vulnerability
Overview
CVE-2026-26978 is a high-severity vulnerability in the FreePBX backup module affecting versions below 16.0.71 and 17.0.6. During backup restore operations, the module extracts files from a user-supplied tar archive and passes the content of a manifest file directly to PHP's unserialize() without validation, class restrictions, or integrity checks [1]. This insecure deserialization allows an attacker to inject arbitrary PHP objects that can execute code upon deserialization.
Exploitation
Prerequisites and Attack Surface
Exploitation requires authentication with a known username that has sufficient access permissions to the FreePBX Administrator Control Panel and write access to backup files [1]. The attack does not require shell access, CLI access, or filesystem write permissions beyond the normal restore workflow. An attacker can craft a malicious tar archive containing a specially crafted manifest file that, when processed by the vulnerable getMetadata() function, triggers remote code execution [2][3]. The vulnerability is network-accessible (CVSS:4.0/AV:N) with low attack complexity and no user interaction required [1].
Impact
Successful exploitation allows an attacker to achieve remote code execution as the web server user (typically asterisk or www-data) [1]. This can lead to full compromise of the FreePBX system, including access to call records, voicemail, configuration files, and the ability to pivot to other systems on the network. The CVSS 4.0 base score is 8.6 (High) with high impacts on confidentiality and integrity [1].
Mitigation
Status
The vulnerability has been fixed in FreePBX versions 16.0.71 and 17.0.6. The fix replaces the unsafe unserialize() call with json_decode() and, as a fallback, uses unserialize() with the ['allowed_classes' => false] option to prevent object instantiation [2][3]. Administrators should update immediately and restrict access to the backup and restore modules to trusted users only [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
50- AI Resilience: Preparing Infrastructure and Operations Teams for Autonomous AIGovInfoSecurity · May 19, 2026
- Securing Autonomous AI: New Security Strategies for AI Agents and Machine-Speed RiskGovInfoSecurity · May 19, 2026
- The AI Trust Gap: Governing Autonomous AI Without Losing Visibility or ControlGovInfoSecurity · May 19, 2026
- Why Hospitals Must Rethink Cyber ResilienceGovInfoSecurity · May 19, 2026
- Live Webinar | Is $125K/Hour Risk Worth Running Unsupported Systems?GovInfoSecurity · May 18, 2026
- Live Webinar | Is $125K/Hour Risk Worth Running Unsupported Systems?GovInfoSecurity · May 18, 2026
- Microsoft confirms Windows 11 security update install issuesBleepingComputer · May 18, 2026
- Microsoft rejects critical Azure vulnerability report, no CVE issuedBleepingComputer · May 16, 2026
- Chrome 148 Update Patches Critical VulnerabilitiesSecurityWeek · May 15, 2026
- Bring out your dead: How agentic AI for cybersecurity helps you rid your cloud of forgotten, risky assetsTenable Blog · May 14, 2026
- White House cyber official: identity security matters more than ever in the age of AICyberScoop · May 14, 2026
- Wordfence Intelligence Weekly WordPress Vulnerability Report (May 4, 2026 to May 10, 2026)Wordfence Blog · May 14, 2026
- HYCU aiR detects insider risk and AI activity from backupsHelp Net Security · May 14, 2026
- Webinar tomorrow: Why security alone won't stop modern attacksBleepingComputer · May 13, 2026
- Thus Spoke…The GentlemenCheck Point Research · May 13, 2026
- Browser Run: now running on Cloudflare Containers, it’s faster and more scalableCloudflare Blog · May 13, 2026
- Foxconn confirms cyberattack claimed by Nitrogen ransomware gangBleepingComputer · May 13, 2026
- Veeam Intelligent ResOps unifies data context and recoveryHelp Net Security · May 12, 2026
- State of ransomware in 2026Securelist · May 12, 2026
- Webinar this week: Prevention alone is not enough against modern attacksBleepingComputer · May 11, 2026
- LLMs and Text-in-Text SteganographySchneier on Security · May 11, 2026
- Zero Chaos: Scaling Detection Engineering at the Speed of Software, with Detection As CodeRapid7 Blog · May 8, 2026
- ‘PCPJack’ Worm Removes TeamPCP Infections, Steals CredentialsSecurityWeek · May 8, 2026
- Object First Fleet Manager simplifies distributed backup storageHelp Net Security · May 8, 2026
- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 27, 2026 to May 3, 2026)Wordfence Blog · May 7, 2026
- New PCPJack worm steals credentials, cleans TeamPCP infectionsBleepingComputer · May 7, 2026
- ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New StoriesThe Hacker News · May 7, 2026
- Day Zero Readiness: The Operational Gaps That Break Incident ResponseThe Hacker News · May 7, 2026
- Why ransomware attacks succeed even when backups existBleepingComputer · May 6, 2026
- From Stuxnet to ChatGPT: 20 News Events That Shaped CyberDark Reading · May 6, 2026
- Meta adds proof-based security to encrypted backupsHelp Net Security · May 5, 2026
- Cybersecurity M&A Roundup: 33 Deals Announced in April 2026SecurityWeek · May 4, 2026
- Webinar: Why MSPs must rethink security and backup strategiesBleepingComputer · May 4, 2026
- Microsoft confirms April Windows updates cause backup failuresBleepingComputer · May 4, 2026
- OpenAI Rolls Out Advanced Security for ChatGPT AccountsSecurityWeek · May 4, 2026
- ChatGPT advanced account security adds passkeys and hardware keysHelp Net Security · May 3, 2026
- 3 easy-to-miss cybersecurity risks for small businessesMalwarebytes Labs · May 3, 2026
- Week in review: High-severity LPE vulnerability in the Linux kernel, cPanel 0-day exploited for monthsHelp Net Security · May 3, 2026
- Code Orange: Fail Small is complete. The result is a stronger Cloudflare networkCloudflare Blog · May 1, 2026
- Microsoft fixes Remote Desktop warnings displaying incorrectlyBleepingComputer · May 1, 2026
- New infosec products of the month: April 2026Help Net Security · May 1, 2026
- April KB5083769 Windows 11 update causes backup software failuresBleepingComputer · Apr 30, 2026
- Nearly half of UK businesses pwned last year as phishing keeps doing the job like it's 2005The Register Security · Apr 30, 2026
- Nearly half of UK businesses pwned last year as phishing keeps doing the job like it's 2005The Register Security · Apr 30, 2026
- Feuding Ransomware Groups Leak Each Other's DataDark Reading · Apr 28, 2026
- VECT: Ransomware by design, Wiper by accidentCheck Point Research · Apr 28, 2026
- Shutdowns, power outages, and conflict: a review of Q1 2026 Internet disruptionsCloudflare Blog · Apr 28, 2026
- Cursor-Opus agent snuffs out startup’s production databaseThe Register Security · Apr 27, 2026
- UNC6692 Combines Social Engineering, Malware, Cloud AbuseDark Reading · Apr 27, 2026
- PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian NetworksThe Hacker News · Apr 27, 2026