๐Ÿ”ด CVE-2025-57819

FreePBX security-reporting module contains an authentication bypass vulnerability leading to SQL injection and RCE. This web-based PBX management interface is commonly exposed to the internet for remote administration and has been actively exploited since August 2025.

โ† Back to Overview
HIGH_RISK
Risk Level
T1190
MITRE Technique
10.0
CVSS Score
NETWORK
Attack Vector
VERY_HIGH
Deployment Risk

๐Ÿ“‹ Vulnerability Details

Data Source: CIRCL

Confidence: HIGH

Exploitation Method: DIRECT_NETWORK

CVE Published: 2025-08-28

Added to CISA KEV: 2025-08-29 1 DAY BETWEEN CVE AND KEV

๐ŸŽฏ Recommendations:

๐Ÿ” Web Intelligence

Key Sources:

  • CVE-2025-57819 - Exploits & Severity - Feedly

    Summary. A critical vulnerability in FreePBX, an open-source web-based graphical user interface, affects versions 15, 16, and 17.

  • Critical FreePBX Vulnerability (CVE-2025-57819) Under Active Exploitation

    Executive Summary: A critical flaw (CVE-2025-57819) in FreePBX versions 15, 16, and 17 enables unauthenticated attackers to perform SQL injection and remote code execution (RCE), with 25 vulnerable IP addresses found in Bangladesh. Immediate patching, system updates, and access restrictions are crucial to prevent exploitation.

  • CVE-2025-57819 Detail - NVD

    FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX ...

  • CVE-2025-57819 | Tenableยฎ

    FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX ...

  • Exploited! Ivanti EPMM Authentication Bypass &

    Use the IONIX Exposure Management Platform to validate exploitability across Internet-facing hosts and prioritise RCE chains that truly work in ...