Advisory 97: CVE-2025-57819_Sangoma FreePBX Authentication Bypass Vulnerability
Release Date: 29th of August 2025
Impact : HIGH / CRITICAL
TLP Rating: Clear
CERT Vanuatu (CERTVU) and the Department of Communication and Digital Transformation (DCDT) provide the following advisory.
This alert is relevant to Organizations and technical individuals who utilize and manage the product.
What is it?
CERTVU would like to advise on the following;
CVE-2025-57819 is a critical vulnerability in the commercial “endpoint” module of FreePBX versions 15, 16, and 17, caused by insufficient sanitization of user-supplied input. This flaw enables unauthenticated attackers to bypass admin access controls, perform SQL injection, and ultimately achieve remote code execution
What are the Systems affected?
- FreePBX 15 versions prior to 15.0.66.
- FreePBX 16 versions prior to 16.0.89.
- FreePBX 17 versions prior to 17.0.3.
What this means?
How Attackers can exploit this vulnerability;
- Initial Access: Attackers exploit unsanitized input vulnerabilities in the endpoint module to bypass authentication and gain access to the FreePBX Administrator interface.
- SQL Injection: Once inside, they can execute arbitrary SQL queries to manipulate the database.
- Remote Code Execution: The SQL injection is chained to achieve Remote Code Execution (RCE) – potentially with root-level privileges - giving attackers full system control.
Mitigation process
CERT Vanuatu advises IT Personel/System Administrators and technical people to apply immediate remediation by;
- Upgrade FreePBX immediately to one of the following patched versions:
- FreePBX 15 – 15.0.66 -
- FreePBX 16 – 16.0.89 -
- FreePBX 17 – 17.0.3
- Apply Network Security Control by restricting administrative access to trusted ranges using firewall rules or the FreePBX Firewall module. Deny external access until systems are patched.
- Constant monitoring on web server logs for suspicious traffics and activities in your network.
References
- https://www.cisa.gov/news-events/alerts/2025/08/29/cisa-adds-one-known-exploited-vulnerability-catalog
- https://www.cve.org/CVERecord?id=CVE-2025-57819
- https://nvd.nist.gov/vuln/detail/CVE-2025-57819
- Download advisory (English): Google vulnerability