Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67736: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting

0
High
VulnerabilityCVE-2025-67736cvecve-2025-67736cwe-89
Published: Tue Dec 16 2025 (12/16/2025, 00:23:05 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: security-reporting

Description

The FreePBX module tts (Text to Speech) for FreePBX, an open-source web-based graphical user interface (GUI) that manages Asterisk. Versions prior to 16.0.5 and 17.0.5 are vulnerable to SQL injection by authenticated users with administrator access. Authenticated users with administrative access to the Administrator Control Panel (ACP) can leverage this SQL injection vulnerability to extract sensitive information from the database and execute code on the system as the `asterisk` user with chained elevation to `root` privileges. Users should upgrade to version 16.0.5 or 17.0.5 to receive a fix.

AI-Powered Analysis

AILast updated: 12/16/2025, 01:00:58 UTC

Technical Analysis

CVE-2025-67736 is a critical SQL injection vulnerability identified in the FreePBX tts (Text to Speech) module, an open-source GUI managing Asterisk telephony systems. The flaw exists in versions prior to 16.0.5 and between 17.0.0 and 17.0.5, allowing authenticated users with administrator privileges to inject malicious SQL commands. This improper neutralization of special elements in SQL commands (CWE-89) enables attackers to extract sensitive data from the backend database and execute arbitrary code on the system as the 'asterisk' user. Through chained privilege escalation, attackers can gain root-level access, compromising the entire system. The vulnerability requires no user interaction beyond admin authentication, making it highly exploitable in environments where administrative credentials are compromised or weakly protected. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no attack or user interaction required, but high privileges needed. The vulnerability affects the security-reporting component of FreePBX, which is integral to telephony management and monitoring. No known exploits are currently in the wild, but the potential impact is severe, including data leakage, system compromise, and disruption of telephony services. The recommended remediation is to upgrade FreePBX to versions 16.0.5 or 17.0.5 where the vulnerability is patched.

Potential Impact

For European organizations, this vulnerability poses a significant risk to telephony infrastructure security, particularly those using FreePBX for managing Asterisk-based systems. Exploitation can lead to unauthorized disclosure of sensitive call data, user credentials, and configuration information, undermining confidentiality. The ability to execute code as the 'asterisk' user and escalate to root compromises system integrity and availability, potentially disrupting critical communication services. This can affect enterprises, government agencies, and service providers relying on FreePBX for VoIP and unified communications. The impact extends to regulatory compliance risks under GDPR due to potential data breaches. Telephony service outages can affect business continuity and emergency response capabilities. The vulnerability's exploitation could also serve as a foothold for lateral movement within networks, increasing overall cyber risk exposure.

Mitigation Recommendations

Organizations should immediately upgrade FreePBX installations to version 16.0.5 or 17.0.5 to apply the official patch. Restrict administrative access to the FreePBX Administrator Control Panel using network segmentation, VPNs, and strong multi-factor authentication to reduce the risk of credential compromise. Regularly audit and monitor administrative activities and database queries for anomalous behavior indicative of SQL injection attempts. Employ web application firewalls (WAFs) with rules tailored to detect and block SQL injection patterns targeting FreePBX modules. Conduct thorough security assessments of telephony infrastructure and implement least privilege principles for all user accounts. Maintain up-to-date backups of configuration and call data to enable rapid recovery in case of compromise. Educate administrators on secure credential management and the risks associated with elevated privileges. Finally, monitor threat intelligence sources for emerging exploits targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-11T00:45:45.791Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6940abb2d9bcdf3f3d143154

Added to database: 12/16/2025, 12:45:38 AM

Last enriched: 12/16/2025, 1:00:58 AM

Last updated: 12/16/2025, 8:06:24 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats