PT-2025-35106 · Freepbx · Freepbx
Matthewljensen
·
Published
2025-08-28
·
Updated
2025-08-30
·
CVE-2025-57819
10
Critical
Base vector | Vector | AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H |
**Name of the Vulnerable Software and Affected Versions:**
FreePBX versions prior to 15.0.66
FreePBX versions prior to 16.0.89
FreePBX versions prior to 17.0.3
**Description:**
FreePBX is vulnerable due to insufficiently sanitized user-supplied data, allowing unauthenticated access to the FreePBX Administrator interface. This can lead to arbitrary database manipulation and remote code execution (RCE). The vulnerability is actively exploited in the wild, with over 6620 unpatched instances observed and at least 386 systems compromised as of August 29, 2025. Exploitation has been ongoing since August 21, 2025. The vulnerability allows attackers to bypass login protections, perform SQL injection, and achieve remote code execution. Approximately 85.9k vulnerable instances have been identified.
**Recommendations:**
Update to FreePBX version 15.0.66 or later.
Update to FreePBX version 16.0.89 or later.
Update to FreePBX version 17.0.3 or later.
Fix
RCE
Authentication Bypass Using an Alternate Path or Channel
SQL injection
Related Identifiers
Affected Products
References · 41
- https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h⭐ 3 🔗 1 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-57819 · Security Note
- https://bdu.fstec.ru/vul/2025-10524 · Security Note
- https://github.com/FreePBX/security-reporting⭐ 3 🔗 1 · Note
- https://twitter.com/Shadowserver/status/1961811040087220443 · Twitter Post
- https://t.me/CSIRT_italia/2682 · Telegram Post
- https://twitter.com/dpharristech/status/1961791066383745152 · Twitter Post
- https://twitter.com/TechNadu/status/1961807242497597692 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1961414739063435445 · Twitter Post
- https://t.me/CVEtracker/31144 · Telegram Post
- https://twitter.com/CISACyber/status/1961494262534869048 · Twitter Post
- https://twitter.com/offseq/status/1961240123636355159 · Twitter Post
- https://twitter.com/Netlas_io/status/1961290027775762615 · Twitter Post
- https://twitter.com/chum1ng0/status/1961488673456726423 · Twitter Post
- https://twitter.com/ScyScan/status/1961504429779358196 · Twitter Post