Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting

0
High
VulnerabilityCVE-2025-62173cvecve-2025-62173cwe-89
Published: Wed Dec 03 2025 (12/03/2025, 23:14:56 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: security-reporting

Description

## Summary Authenticated SQL Injection Vulnerability in Endpoint Module Rest API

AI-Powered Analysis

AILast updated: 12/11/2025, 00:08:52 UTC

Technical Analysis

CVE-2025-62173 is an authenticated SQL Injection vulnerability identified in the security-reporting component of FreePBX, a widely used open-source IP telephony platform. The vulnerability exists in the Endpoint Module REST API, which processes SQL commands without proper neutralization of special elements, allowing attackers with high privileges to inject malicious SQL code. Specifically, the flaw falls under CWE-89, indicating improper sanitization of inputs used in SQL commands. Affected versions include all releases prior to 16.0.41 and versions from 17.0.0 up to but not including 17.0.6. The vulnerability requires an attacker to have authenticated access with high privileges (e.g., administrative credentials), but does not require user interaction, making it easier to exploit once access is gained. Exploitation could lead to unauthorized data disclosure, modification, or deletion within the FreePBX database, potentially impacting call records, user credentials, or configuration data. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no user interaction, high confidentiality and integrity impact, and low availability impact. No public exploits have been reported yet, but the vulnerability is considered high risk due to the critical role of FreePBX in telephony infrastructure and the sensitive nature of the data involved.

Potential Impact

For European organizations, the impact of CVE-2025-62173 can be significant. FreePBX is commonly deployed in enterprise and public sector telephony systems across Europe, handling sensitive communications and call metadata. Successful exploitation could lead to unauthorized access to call logs, user credentials, and configuration settings, resulting in data breaches and potential disruption of telephony services. This could affect confidentiality by exposing sensitive communication data, integrity by allowing unauthorized changes to system configurations or call routing, and availability if database corruption occurs. Given the vulnerability requires high privilege authentication, the risk is heightened if administrative credentials are compromised or insufficiently protected. The impact is particularly critical for organizations relying on FreePBX for secure communications, including government agencies, healthcare providers, and financial institutions in Europe. Additionally, regulatory compliance risks arise under GDPR if personal data is exposed due to exploitation.

Mitigation Recommendations

To mitigate CVE-2025-62173, European organizations should: 1) Immediately plan and apply updates to FreePBX versions 16.0.41 or later, or 17.0.6 or later once patches are released, as these versions address the vulnerability. 2) Restrict access to the Endpoint Module REST API to trusted administrators only, using network segmentation and firewall rules to limit exposure. 3) Enforce strong authentication mechanisms and regularly rotate administrative credentials to reduce the risk of privilege compromise. 4) Implement monitoring and alerting for unusual database queries or API usage patterns that could indicate attempted exploitation. 5) Conduct regular security audits and penetration tests focusing on telephony infrastructure to identify and remediate similar injection flaws. 6) Consider deploying Web Application Firewalls (WAFs) with SQL injection detection capabilities to provide an additional layer of defense. 7) Educate administrators on secure configuration and the risks of SQL injection vulnerabilities to maintain vigilance.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-07T16:12:03.426Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6930c7c5cd38a5251eae5a76

Added to database: 12/3/2025, 11:29:09 PM

Last enriched: 12/11/2025, 12:08:52 AM

Last updated: 1/18/2026, 5:33:15 AM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats