CVE-2025-52207

9.9 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload PHP scripts to arbitrary directories on MikoPBX systems, potentially leading to remote code execution. It affects all MikoPBX installations through version 2024.1.114. Organizations using MikoPBX for telephony services are at risk.

💻 Affected Systems

Products:
  • MikoPBX
Versions: All versions through 2024.1.114
Operating Systems: Linux-based MikoPBX OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining root access, installing persistent backdoors, intercepting all calls and data, and pivoting to internal networks.

🟠

Likely Case

Remote code execution leading to web shell installation, credential theft, call interception, and data exfiltration.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and file upload restrictions are in place.

🌐 Internet-Facing: HIGH - Directly exploitable via web interface without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple file upload vulnerability requiring only web access. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2024.1.114

Vendor Advisory: https://github.com/mikopbx/Core/commit/3ee785429d3f1b33c9ab387ef4221127c9b8c5f3

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Update MikoPBX to version after 2024.1.114 via web interface or command line. 3. Restart the PBX system. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Restrict File Uploads

linux

Block PHP file uploads via web application firewall or .htaccess rules

# Add to .htaccess: <FilesMatch "\.php$">
    Deny from all
</FilesMatch>

Network Segmentation

linux

Restrict access to PBX web interface to trusted networks only

# iptables example: iptables -A INPUT -p tcp --dport 80 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit PBX web interface access
  • Deploy web application firewall with file upload filtering rules

🔍 How to Verify

Check if Vulnerable:

Check MikoPBX version via web interface admin panel or SSH command: cat /etc/version

Check Version:

cat /etc/version

Verify Fix Applied:

Verify version is greater than 2024.1.114 and test file upload functionality with PHP files

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to PBXCoreREST/Controllers/Files/
  • PHP file creation in unexpected directories
  • Web shell access patterns

Network Indicators:

  • HTTP POST requests to upload endpoints with PHP files
  • Unusual outbound connections from PBX system

SIEM Query:

source="web_logs" AND (uri="/PBXCoreREST/Controllers/Files/PostController.php" OR file_extension="php") AND method="POST"

🔗 References

📤 Share & Export