{"api_version":"1","generated_at":"2026-04-22T23:30:37+00:00","cve":"CVE-2019-16967","urls":{"html":"https://cve.report/CVE-2019-16967","api":"https://cve.report/api/cve/CVE-2019-16967.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-16967","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-16967"},"summary":{"title":"CVE-2019-16967","description":"An issue was discovered in Manager 13.x before 13.0.2.6 and 15.x before 15.0.6 before FreePBX 14.0.10.3. In the Manager module form (html\\admin\\modules\\manager\\views\\form.php), an unsanitized managerdisplay variable coming from the URL is reflected in HTML, leading to XSS. It can be requested via GET request to /config.php?type=tool&display=manager.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2019-10-21 20:15:00","updated_at":"2019-12-10 17:08:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://issues.freepbx.org/browse/FREEPBX-20436","name":"https://issues.freepbx.org/browse/FREEPBX-20436","refsource":"MISC","tags":["Exploit","Vendor Advisory"],"title":"[FREEPBX-20436] XSS vulnerability in manager module - Sangoma Issue Tracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/FreePBX/manager/commit/071a50983ca6a373bb2d1d3db68e9eda4667a372","name":"https://github.com/FreePBX/manager/commit/071a50983ca6a373bb2d1d3db68e9eda4667a372","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"FREEPBX-20436 XSS vulnerability in manager module · FreePBX/manager@071a509 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://resp3ctblog.wordpress.com/2019/10/19/freepbx-xss-2/","name":"https://resp3ctblog.wordpress.com/2019/10/19/freepbx-xss-2/","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"FreePBX XSS 2 – Resp3ct blog","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-16967","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16967","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"16967","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freepbx","cpe5":"manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"16967","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freepbx","cpe5":"manager","cpe6":"13.0.1","cpe7":"alpha1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"16967","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freepbx","cpe5":"manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"16967","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freepbx","cpe5":"manager","cpe6":"13.0.1","cpe7":"alpha1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"16967","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sangoma","cpe5":"freepbx","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"16967","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sangoma","cpe5":"freepbx","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2019-16967","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Manager 13.x before 13.0.2.6 and 15.x before 15.0.6 before FreePBX 14.0.10.3. In the Manager module form (html\\admin\\modules\\manager\\views\\form.php), an unsanitized managerdisplay variable coming from the URL is reflected in HTML, leading to XSS. It can be requested via GET request to /config.php?type=tool&display=manager."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://issues.freepbx.org/browse/FREEPBX-20436","refsource":"MISC","name":"https://issues.freepbx.org/browse/FREEPBX-20436"},{"url":"https://github.com/FreePBX/manager/commit/071a50983ca6a373bb2d1d3db68e9eda4667a372","refsource":"MISC","name":"https://github.com/FreePBX/manager/commit/071a50983ca6a373bb2d1d3db68e9eda4667a372"},{"refsource":"MISC","name":"https://resp3ctblog.wordpress.com/2019/10/19/freepbx-xss-2/","url":"https://resp3ctblog.wordpress.com/2019/10/19/freepbx-xss-2/"}]}},"nvd":{"publishedDate":"2019-10-21 20:15:00","lastModifiedDate":"2019-12-10 17:08:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:freepbx:manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.2","versionEndExcluding":"15.0.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:freepbx:manager:13.0.1:alpha1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:freepbx:manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.2","versionEndExcluding":"13.0.2.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sangoma:freepbx:*:*:*:*:*:*:*:*","versionEndExcluding":"14.0.10.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"16967","Ordinal":"156738","Title":"CVE-2019-16967","CVE":"CVE-2019-16967","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"16967","Ordinal":"1","NoteData":"An issue was discovered in Manager 13.x before 13.0.2.6 and 15.x before 15.0.6 before FreePBX 14.0.10.3. In the Manager module form (html\\admin\\modules\\manager\\views\\form.php), an unsanitized managerdisplay variable coming from the URL is reflected in HTML, leading to XSS. It can be requested via GET request to /config.php?type=tool&display=manager.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"16967","Ordinal":"2","NoteData":"2019-10-21","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"16967","Ordinal":"3","NoteData":"2019-10-21","Type":"Other","Title":"Modified"}]}}}