CVE-2025-57819 – FreePBX Unauthenticated Remote Code Execution Vulnerability

The following table lists the changes that have been made to the
CVE-2025-57819 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 28, 2025

    Action Type Old Value New Value
    Added Description FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-89
    Added CWE CWE-288
    Added Reference https://community.freepbx.org/t/security-advisory-please-lock-down-your-administrator-access/107203
    Added Reference https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h
Share the Post:

Related Posts