FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3.
References
| Link | Resource |
|---|---|
| https://community.freepbx.org/t/security-advisory-please-lock-down-your-administrator-access/107203 | Issue Tracking Vendor Advisory |
| https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h | Mitigation Vendor Advisory |
| https://github.com/watchtowrlabs/watchTowr-vs-FreePBX-CVE-2025-57819 | Exploit Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-57819 | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-08-28 17:15
Updated : 2025-10-24 13:58
NVD link : CVE-2025-57819
Mitre link : CVE-2025-57819
CVE.ORG link : CVE-2025-57819
JSON object : View
Products Affected
sangoma
- freepbx
