Home

Description

The FreePBX module tts (Text to Speech) for FreePBX, an open-source web-based graphical user interface (GUI) that manages Asterisk. Versions prior to 16.0.5 and 17.0.5 are vulnerable to SQL injection by authenticated users with administrator access. Authenticated users with administrative access to the Administrator Control Panel (ACP) can leverage this SQL injection vulnerability to extract sensitive information from the database and execute code on the system as the `asterisk` user with chained elevation to `root` privileges. Users should upgrade to version 16.0.5 or 17.0.5 to receive a fix.

PUBLISHED Reserved 2025-12-11 | Published 2025-12-16 | Updated 2025-12-17 | Assigner GitHub_M




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 16.0.5
affected

>= 17.0.0, < 17.0.5
affected

References

github.com/...orting/security/advisories/GHSA-632c-49p9-x7cw

www.freepbx.org/watch-what-we-do-with-security-fixes-👀

cve.org (CVE-2025-67736)

nvd.nist.gov (CVE-2025-67736)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.