CVE-2025-67722: CWE-426: Untrusted Search Path in FreePBX security-reporting
FreePBX is an open-source web-based graphical user interface (GUI) that manages Asterisk. Prior to versions 16.0.45 and 17.0.24 of the FreePBX framework, an authenticated local privilege escalation exists in the deprecated FreePBX startup script `amportal`. In the deprecated `amportal` utility, the lookup for the `freepbx_engine` file occurs in `/etc/asterisk/` directories. Typically, these are configured by FreePBX as writable by the **asterisk** user and any members of the **asterisk** group. This means that a member of the **asterisk** group can add their own `freepbx_engine` file in `/etc/asterisk/` and upon `amportal` executing, it would exec that file with root permissions (even though the file was created and placed by a non-root user). Version 16.0.45 and 17.0.24 contain a fix for the issue. Other mitigation strategies are also available. Confirm only trusted local OS system users are members of the `asterisk` group. Look for suspicious files in the `/etc/asterisk/` directory (via Admin -> Config Edit in the GUI, or via CLI). Double-check that `live_dangerously = no` is set (or unconfigured, as the default is **no**) in `/etc/asterisk/asterisk.conf` file. Eliminate any unsafe custom use of Asterisk dial plan applications and functions that potentially can manipulate the file system, e.g., System(), FILE(), etc.
AI Analysis
Technical Summary
CVE-2025-67722 is a local privilege escalation vulnerability in FreePBX, an open-source GUI managing Asterisk telephony systems. The flaw exists in the deprecated amportal startup script, which looks for the freepbx_engine executable in the /etc/asterisk/ directory. This directory is typically writable by the asterisk user and group, allowing any member of the asterisk group to place a malicious freepbx_engine file. When amportal runs, it executes this file with root privileges, effectively escalating privileges from a non-root user to root. The vulnerability affects FreePBX versions prior to 16.0.45 and between 17.0.0 and 17.0.24, where the issue has been fixed. Exploitation requires authenticated local access and group membership but no additional user interaction. The vulnerability is classified under CWE-426 (Untrusted Search Path), highlighting the risk of executing files from writable directories without proper path validation. The CVSS 4.0 score is 5.7 (medium severity), reflecting the local attack vector, required privileges, and high impact on confidentiality, integrity, and availability. Mitigation involves upgrading FreePBX to patched versions, restricting asterisk group membership to trusted users only, auditing the /etc/asterisk/ directory for unauthorized files, ensuring the live_dangerously setting is disabled (default no), and avoiding unsafe dial plan applications that can manipulate the filesystem such as System() or FILE(). No known exploits are reported in the wild yet, but the potential for root compromise makes this a significant risk for affected systems.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of VoIP and telephony infrastructures relying on FreePBX. Successful exploitation allows an attacker with authenticated local access and asterisk group membership to gain root privileges, potentially leading to full system compromise. This could result in unauthorized call interception, manipulation of telephony services, disruption of communications, and lateral movement within the network. Confidentiality of sensitive communications and integrity of telephony configurations can be severely impacted. Availability of telephony services may also be disrupted by malicious actions or system instability caused by the exploit. Given the critical role of telephony in business operations, especially in sectors like finance, healthcare, and government, the impact can extend to regulatory non-compliance and reputational damage. The requirement for local access and group membership limits the attack surface but insider threats or compromised user accounts increase risk. Organizations with remote access to FreePBX management interfaces or weak internal controls are particularly vulnerable.
Mitigation Recommendations
1. Upgrade FreePBX installations to version 16.0.45, 17.0.24, or later where the vulnerability is patched. 2. Restrict membership of the asterisk group strictly to trusted system administrators and service accounts; regularly audit group membership. 3. Conduct thorough inspections of the /etc/asterisk/ directory to detect and remove any unauthorized or suspicious freepbx_engine files or other executables. 4. Verify that the live_dangerously setting in /etc/asterisk/asterisk.conf is set to no or left unconfigured (default no) to prevent unsafe operations. 5. Review and eliminate any custom dial plan applications or functions that allow filesystem manipulation, such as System() or FILE(), to reduce attack vectors. 6. Implement strict access controls and monitoring on FreePBX management interfaces to prevent unauthorized local access. 7. Employ host-based intrusion detection systems to alert on unexpected file creations or executions in /etc/asterisk/. 8. Educate administrators about the risks of deprecated utilities like amportal and encourage migration to supported management tools. 9. Maintain regular backups of telephony configurations and system states to enable recovery in case of compromise. 10. Monitor security advisories for any emerging exploits or additional patches related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-67722: CWE-426: Untrusted Search Path in FreePBX security-reporting
Description
FreePBX is an open-source web-based graphical user interface (GUI) that manages Asterisk. Prior to versions 16.0.45 and 17.0.24 of the FreePBX framework, an authenticated local privilege escalation exists in the deprecated FreePBX startup script `amportal`. In the deprecated `amportal` utility, the lookup for the `freepbx_engine` file occurs in `/etc/asterisk/` directories. Typically, these are configured by FreePBX as writable by the **asterisk** user and any members of the **asterisk** group. This means that a member of the **asterisk** group can add their own `freepbx_engine` file in `/etc/asterisk/` and upon `amportal` executing, it would exec that file with root permissions (even though the file was created and placed by a non-root user). Version 16.0.45 and 17.0.24 contain a fix for the issue. Other mitigation strategies are also available. Confirm only trusted local OS system users are members of the `asterisk` group. Look for suspicious files in the `/etc/asterisk/` directory (via Admin -> Config Edit in the GUI, or via CLI). Double-check that `live_dangerously = no` is set (or unconfigured, as the default is **no**) in `/etc/asterisk/asterisk.conf` file. Eliminate any unsafe custom use of Asterisk dial plan applications and functions that potentially can manipulate the file system, e.g., System(), FILE(), etc.
AI-Powered Analysis
Technical Analysis
CVE-2025-67722 is a local privilege escalation vulnerability in FreePBX, an open-source GUI managing Asterisk telephony systems. The flaw exists in the deprecated amportal startup script, which looks for the freepbx_engine executable in the /etc/asterisk/ directory. This directory is typically writable by the asterisk user and group, allowing any member of the asterisk group to place a malicious freepbx_engine file. When amportal runs, it executes this file with root privileges, effectively escalating privileges from a non-root user to root. The vulnerability affects FreePBX versions prior to 16.0.45 and between 17.0.0 and 17.0.24, where the issue has been fixed. Exploitation requires authenticated local access and group membership but no additional user interaction. The vulnerability is classified under CWE-426 (Untrusted Search Path), highlighting the risk of executing files from writable directories without proper path validation. The CVSS 4.0 score is 5.7 (medium severity), reflecting the local attack vector, required privileges, and high impact on confidentiality, integrity, and availability. Mitigation involves upgrading FreePBX to patched versions, restricting asterisk group membership to trusted users only, auditing the /etc/asterisk/ directory for unauthorized files, ensuring the live_dangerously setting is disabled (default no), and avoiding unsafe dial plan applications that can manipulate the filesystem such as System() or FILE(). No known exploits are reported in the wild yet, but the potential for root compromise makes this a significant risk for affected systems.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of VoIP and telephony infrastructures relying on FreePBX. Successful exploitation allows an attacker with authenticated local access and asterisk group membership to gain root privileges, potentially leading to full system compromise. This could result in unauthorized call interception, manipulation of telephony services, disruption of communications, and lateral movement within the network. Confidentiality of sensitive communications and integrity of telephony configurations can be severely impacted. Availability of telephony services may also be disrupted by malicious actions or system instability caused by the exploit. Given the critical role of telephony in business operations, especially in sectors like finance, healthcare, and government, the impact can extend to regulatory non-compliance and reputational damage. The requirement for local access and group membership limits the attack surface but insider threats or compromised user accounts increase risk. Organizations with remote access to FreePBX management interfaces or weak internal controls are particularly vulnerable.
Mitigation Recommendations
1. Upgrade FreePBX installations to version 16.0.45, 17.0.24, or later where the vulnerability is patched. 2. Restrict membership of the asterisk group strictly to trusted system administrators and service accounts; regularly audit group membership. 3. Conduct thorough inspections of the /etc/asterisk/ directory to detect and remove any unauthorized or suspicious freepbx_engine files or other executables. 4. Verify that the live_dangerously setting in /etc/asterisk/asterisk.conf is set to no or left unconfigured (default no) to prevent unsafe operations. 5. Review and eliminate any custom dial plan applications or functions that allow filesystem manipulation, such as System() or FILE(), to reduce attack vectors. 6. Implement strict access controls and monitoring on FreePBX management interfaces to prevent unauthorized local access. 7. Employ host-based intrusion detection systems to alert on unexpected file creations or executions in /etc/asterisk/. 8. Educate administrators about the risks of deprecated utilities like amportal and encourage migration to supported management tools. 9. Maintain regular backups of telephony configurations and system states to enable recovery in case of compromise. 10. Monitor security advisories for any emerging exploits or additional patches related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-10T18:46:14.763Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6940abb2d9bcdf3f3d143150
Added to database: 12/16/2025, 12:45:38 AM
Last enriched: 12/23/2025, 1:25:36 AM
Last updated: 2/7/2026, 10:07:50 AM
Views: 102
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.