CVE-2025-57819

9.8 CRITICAL CISA KEV - Actively Exploited
Published: August 28, 2025 Modified: October 24, 2025

Description

FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://community.freepbx.org/t/security-advisory-please-lock-down-your-administrator-access/107203
Source: security-advisories@github.com
Issue Tracking Vendor Advisory
https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h
Source: security-advisories@github.com
Mitigation Vendor Advisory
https://github.com/watchtowrlabs/watchTowr-vs-FreePBX-CVE-2025-57819
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-57819
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
76.1%
99th percentile
Exploitation Status
Actively Exploited
Remediation due: 2025-09-19

Weaknesses (CWE)

Affected Vendors

sangoma