Browse all 4 CVE security advisories affecting Xorcom. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Xorcom develops unified communications and PBX systems primarily for business telephony solutions. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and authentication flaws. While no major public security incidents have been widely documented, the four CVEs on record highlight potential risks in web interfaces and configuration management. Security researchers have noted that some vulnerabilities could allow unauthorized access or system compromise, particularly in default deployments. Organizations implementing Xorcom solutions should prioritize timely patching and harden configurations to mitigate these known weaknesses.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-30006 | Xorcom CompletePBX <= 5.2.35 Reflected Cross-Site Scripting — CompletePBXCWE-79 | 6.1 | Medium | 2025-03-31 |
| CVE-2025-30005 | Xorcom CompletePBX <= 5.2.35 Authenticated Path Traversal & File Deletion — CompletePBXCWE-22 | 8.3 | High | 2025-03-31 |
| CVE-2025-30004 | Xorcom CompletePBX <= 5.2.35 Task Scheduler Authenticated Command Injection — CompletePBXCWE-78 | 8.8 | High | 2025-03-31 |
| CVE-2025-2292 | Xorcom CompletePBX <= 5.2.35 Authenticated File Disclosure — CompletePBXCWE-22 | 6.5 | Medium | 2025-03-31 |
This page lists every published CVE security advisory associated with Xorcom. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.