Home

Description

FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3.

PUBLISHED Reserved 2025-08-20 | Published 2025-08-28 | Updated 2025-09-11 | Assigner GitHub_M




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CISA Known Exploited Vulnerability

Date added 2025-08-29 | Due date 2025-09-19

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-288: Authentication Bypass Using an Alternate Path or Channel

Product status

< 15.0.66
affected

< 16.0.89
affected

< 17.0.3
affected

References

github.com/...orting/security/advisories/GHSA-m42g-xg4c-5f3h

community.freepbx.org/...wn-your-administrator-access/107203

cve.org (CVE-2025-57819)

nvd.nist.gov (CVE-2025-57819)

Download JSON