CVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
## Summary Authenticated SQL Injection Vulnerability in Endpoint Module Rest API
AI Analysis
Technical Summary
CVE-2025-62173 is an authenticated SQL Injection vulnerability identified in the security-reporting component of FreePBX, a widely used open-source IP telephony platform. The vulnerability exists in the Endpoint Module REST API, which processes SQL commands without proper neutralization of special elements, allowing attackers with high privileges to inject malicious SQL code. Specifically, the flaw falls under CWE-89, indicating improper sanitization of inputs used in SQL commands. Affected versions include all releases prior to 16.0.41 and versions from 17.0.0 up to but not including 17.0.6. The vulnerability requires an attacker to have authenticated access with high privileges (e.g., administrative credentials), but does not require user interaction, making it easier to exploit once access is gained. Exploitation could lead to unauthorized data disclosure, modification, or deletion within the FreePBX database, potentially impacting call records, user credentials, or configuration data. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no user interaction, high confidentiality and integrity impact, and low availability impact. No public exploits have been reported yet, but the vulnerability is considered high risk due to the critical role of FreePBX in telephony infrastructure and the sensitive nature of the data involved.
Potential Impact
For European organizations, the impact of CVE-2025-62173 can be significant. FreePBX is commonly deployed in enterprise and public sector telephony systems across Europe, handling sensitive communications and call metadata. Successful exploitation could lead to unauthorized access to call logs, user credentials, and configuration settings, resulting in data breaches and potential disruption of telephony services. This could affect confidentiality by exposing sensitive communication data, integrity by allowing unauthorized changes to system configurations or call routing, and availability if database corruption occurs. Given the vulnerability requires high privilege authentication, the risk is heightened if administrative credentials are compromised or insufficiently protected. The impact is particularly critical for organizations relying on FreePBX for secure communications, including government agencies, healthcare providers, and financial institutions in Europe. Additionally, regulatory compliance risks arise under GDPR if personal data is exposed due to exploitation.
Mitigation Recommendations
To mitigate CVE-2025-62173, European organizations should: 1) Immediately plan and apply updates to FreePBX versions 16.0.41 or later, or 17.0.6 or later once patches are released, as these versions address the vulnerability. 2) Restrict access to the Endpoint Module REST API to trusted administrators only, using network segmentation and firewall rules to limit exposure. 3) Enforce strong authentication mechanisms and regularly rotate administrative credentials to reduce the risk of privilege compromise. 4) Implement monitoring and alerting for unusual database queries or API usage patterns that could indicate attempted exploitation. 5) Conduct regular security audits and penetration tests focusing on telephony infrastructure to identify and remediate similar injection flaws. 6) Consider deploying Web Application Firewalls (WAFs) with SQL injection detection capabilities to provide an additional layer of defense. 7) Educate administrators on secure configuration and the risks of SQL injection vulnerabilities to maintain vigilance.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
Description
## Summary Authenticated SQL Injection Vulnerability in Endpoint Module Rest API
AI-Powered Analysis
Technical Analysis
CVE-2025-62173 is an authenticated SQL Injection vulnerability identified in the security-reporting component of FreePBX, a widely used open-source IP telephony platform. The vulnerability exists in the Endpoint Module REST API, which processes SQL commands without proper neutralization of special elements, allowing attackers with high privileges to inject malicious SQL code. Specifically, the flaw falls under CWE-89, indicating improper sanitization of inputs used in SQL commands. Affected versions include all releases prior to 16.0.41 and versions from 17.0.0 up to but not including 17.0.6. The vulnerability requires an attacker to have authenticated access with high privileges (e.g., administrative credentials), but does not require user interaction, making it easier to exploit once access is gained. Exploitation could lead to unauthorized data disclosure, modification, or deletion within the FreePBX database, potentially impacting call records, user credentials, or configuration data. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no user interaction, high confidentiality and integrity impact, and low availability impact. No public exploits have been reported yet, but the vulnerability is considered high risk due to the critical role of FreePBX in telephony infrastructure and the sensitive nature of the data involved.
Potential Impact
For European organizations, the impact of CVE-2025-62173 can be significant. FreePBX is commonly deployed in enterprise and public sector telephony systems across Europe, handling sensitive communications and call metadata. Successful exploitation could lead to unauthorized access to call logs, user credentials, and configuration settings, resulting in data breaches and potential disruption of telephony services. This could affect confidentiality by exposing sensitive communication data, integrity by allowing unauthorized changes to system configurations or call routing, and availability if database corruption occurs. Given the vulnerability requires high privilege authentication, the risk is heightened if administrative credentials are compromised or insufficiently protected. The impact is particularly critical for organizations relying on FreePBX for secure communications, including government agencies, healthcare providers, and financial institutions in Europe. Additionally, regulatory compliance risks arise under GDPR if personal data is exposed due to exploitation.
Mitigation Recommendations
To mitigate CVE-2025-62173, European organizations should: 1) Immediately plan and apply updates to FreePBX versions 16.0.41 or later, or 17.0.6 or later once patches are released, as these versions address the vulnerability. 2) Restrict access to the Endpoint Module REST API to trusted administrators only, using network segmentation and firewall rules to limit exposure. 3) Enforce strong authentication mechanisms and regularly rotate administrative credentials to reduce the risk of privilege compromise. 4) Implement monitoring and alerting for unusual database queries or API usage patterns that could indicate attempted exploitation. 5) Conduct regular security audits and penetration tests focusing on telephony infrastructure to identify and remediate similar injection flaws. 6) Consider deploying Web Application Firewalls (WAFs) with SQL injection detection capabilities to provide an additional layer of defense. 7) Educate administrators on secure configuration and the risks of SQL injection vulnerabilities to maintain vigilance.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-07T16:12:03.426Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6930c7c5cd38a5251eae5a76
Added to database: 12/3/2025, 11:29:09 PM
Last enriched: 12/11/2025, 12:08:52 AM
Last updated: 1/18/2026, 5:33:15 AM
Views: 127
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15533: Heap-based Buffer Overflow in raysan5 raylib
MediumCVE-2026-1110: Buffer Overflow in cijliu librtsp
MediumCVE-2026-1109: Buffer Overflow in cijliu librtsp
MediumCVE-2026-1107: Unrestricted Upload in EyouCMS
MediumCVE-2026-1106: Improper Authorization in Chamilo LMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.