CVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
## Summary Authenticated SQL Injection Vulnerability in Endpoint Module Rest API
AI Analysis
Technical Summary
CVE-2025-62173 is an authenticated SQL Injection vulnerability classified under CWE-89, affecting the security-reporting component of FreePBX, a popular open-source PBX telephony platform. The vulnerability exists in the Endpoint Module REST API, where insufficient neutralization of special SQL elements allows an attacker with high privileges to inject arbitrary SQL commands. This can lead to unauthorized reading, modification, or deletion of database records, impacting confidentiality and integrity. The vulnerability affects FreePBX versions prior to 16.0.41 and versions from 17.0.0 up to but not including 17.0.6. Exploitation requires authentication with high privileges but does not require user interaction, making it a direct threat once credentials are compromised or obtained. The CVSS v4.0 base score is 8.6, reflecting network attack vector, low attack complexity, no user interaction, and high impact on confidentiality and integrity, with limited impact on availability. No public exploits are known yet, but the vulnerability's presence in a critical telephony management system raises concerns about potential data breaches or service disruptions. The lack of official patches at the time of reporting necessitates immediate risk mitigation by users. The vulnerability’s exploitation could allow attackers to manipulate call records, user credentials, or configuration data, severely affecting organizational operations and privacy.
Potential Impact
For European organizations, the impact of CVE-2025-62173 is significant due to FreePBX's widespread use in enterprise telephony and unified communications. Successful exploitation could lead to unauthorized access to sensitive call logs, user credentials, and configuration settings, resulting in data breaches and potential regulatory non-compliance under GDPR. Integrity of telephony data could be compromised, enabling attackers to manipulate call routing or intercept communications. Availability impact is limited but could occur if database corruption or deletion is performed. The requirement for high privilege authentication means insider threats or credential compromise are primary risk vectors. Disruption or compromise of telephony infrastructure can affect business continuity, customer service, and internal communications, which are critical for many sectors including finance, healthcare, and government. The vulnerability also increases the attack surface for advanced persistent threats targeting European organizations’ communications infrastructure.
Mitigation Recommendations
Organizations should immediately upgrade FreePBX installations to versions later than 16.0.41 or 17.0.6 where the vulnerability is patched. Until patches are available, restrict access to the Endpoint Module REST API to trusted administrators only, ideally via network segmentation and firewall rules. Implement strict authentication controls, including multi-factor authentication for administrative accounts, to reduce risk of credential compromise. Conduct thorough input validation and sanitization on all API inputs if custom modifications exist. Monitor logs for unusual API activity or database queries indicative of injection attempts. Regularly audit user privileges to ensure least privilege principles are enforced. Employ Web Application Firewalls (WAFs) with SQL injection detection capabilities to provide an additional layer of defense. Finally, maintain an incident response plan tailored to telephony infrastructure compromise scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Spain, Poland
CVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
Description
## Summary Authenticated SQL Injection Vulnerability in Endpoint Module Rest API
AI-Powered Analysis
Technical Analysis
CVE-2025-62173 is an authenticated SQL Injection vulnerability classified under CWE-89, affecting the security-reporting component of FreePBX, a popular open-source PBX telephony platform. The vulnerability exists in the Endpoint Module REST API, where insufficient neutralization of special SQL elements allows an attacker with high privileges to inject arbitrary SQL commands. This can lead to unauthorized reading, modification, or deletion of database records, impacting confidentiality and integrity. The vulnerability affects FreePBX versions prior to 16.0.41 and versions from 17.0.0 up to but not including 17.0.6. Exploitation requires authentication with high privileges but does not require user interaction, making it a direct threat once credentials are compromised or obtained. The CVSS v4.0 base score is 8.6, reflecting network attack vector, low attack complexity, no user interaction, and high impact on confidentiality and integrity, with limited impact on availability. No public exploits are known yet, but the vulnerability's presence in a critical telephony management system raises concerns about potential data breaches or service disruptions. The lack of official patches at the time of reporting necessitates immediate risk mitigation by users. The vulnerability’s exploitation could allow attackers to manipulate call records, user credentials, or configuration data, severely affecting organizational operations and privacy.
Potential Impact
For European organizations, the impact of CVE-2025-62173 is significant due to FreePBX's widespread use in enterprise telephony and unified communications. Successful exploitation could lead to unauthorized access to sensitive call logs, user credentials, and configuration settings, resulting in data breaches and potential regulatory non-compliance under GDPR. Integrity of telephony data could be compromised, enabling attackers to manipulate call routing or intercept communications. Availability impact is limited but could occur if database corruption or deletion is performed. The requirement for high privilege authentication means insider threats or credential compromise are primary risk vectors. Disruption or compromise of telephony infrastructure can affect business continuity, customer service, and internal communications, which are critical for many sectors including finance, healthcare, and government. The vulnerability also increases the attack surface for advanced persistent threats targeting European organizations’ communications infrastructure.
Mitigation Recommendations
Organizations should immediately upgrade FreePBX installations to versions later than 16.0.41 or 17.0.6 where the vulnerability is patched. Until patches are available, restrict access to the Endpoint Module REST API to trusted administrators only, ideally via network segmentation and firewall rules. Implement strict authentication controls, including multi-factor authentication for administrative accounts, to reduce risk of credential compromise. Conduct thorough input validation and sanitization on all API inputs if custom modifications exist. Monitor logs for unusual API activity or database queries indicative of injection attempts. Regularly audit user privileges to ensure least privilege principles are enforced. Employ Web Application Firewalls (WAFs) with SQL injection detection capabilities to provide an additional layer of defense. Finally, maintain an incident response plan tailored to telephony infrastructure compromise scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-07T16:12:03.426Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6930c7c5cd38a5251eae5a76
Added to database: 12/3/2025, 11:29:09 PM
Last enriched: 12/3/2025, 11:29:23 PM
Last updated: 12/4/2025, 1:35:17 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumCVE-2025-66293: CWE-125: Out-of-bounds Read in pnggroup libpng
HighCVE-2025-65868: n/a
UnknownCVE-2023-0842: Prototype Pollution in xml2js
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.