BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Critical FreePBX Flaws Expose PBX to Authentication Bypass Risks

Critical Security Vulnerabilities Discovered and Fixed in FreePBX Including Authentication Bypass and Remote Code Execution Risks

  • Several security vulnerabilities were found in the open-source PBX platform FreePBX, including a critical authentication bypass.
  • The flaws include SQL injection, arbitrary file upload, and authentication bypass vulnerabilities, all disclosed after discovery in September 2025.
  • The critical authentication bypass affects systems configured with the “webserver” Authorization Type and allows unauthorized administrative access.
  • These vulnerabilities have been fixed in recent software versions, and temporary mitigations are recommended until updates are applied.
  • Users are advised to avoid the legacy “webserver” authentication type due to reduced security risks.

FreePBX, an open-source private branch exchange platform, was found to have multiple security vulnerabilities disclosed in December 2025. The issues were discovered by Horizon3.ai and reported on September 15, 2025. These vulnerabilities include a critical authentication bypass that can allow unauthorized access under certain configurations.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

The disclosed security flaws are as follows:

CVE-2025-61675: An authenticated SQL injection vulnerability affecting four endpoints and 11 parameters. This flaw allows attackers to read and modify the underlying SQL database with a CVSS score of 8.6.

CVE-2025-61678: An authenticated arbitrary file upload vulnerability. Attackers with a valid PHPSESSID can upload a PHP web shell through the firmware upload endpoint, execute arbitrary commands, and access sensitive files such as “/etc/passwd” (CVSS score: 8.6).

CVE-2025-66039: A high-severity authentication bypass vulnerability (CVSS score: 9.3). When the “Authorization Type” is set to “webserver,” attackers can log in to the Administrator Control Panel using a forged Authorization header.

- Advertisement -

This authentication bypass is not exploitable by default since the “Authorization Type” option appears only if three specific settings—Display Friendly Name, Display Readonly Settings, and Override Readonly Settings—are all enabled in the Advanced Settings panel. If enabled, attackers can bypass authentication and insert malicious users into the “ampusers” database, similar to a previously known vulnerability, CVE-2025-57819, which was actively exploited in September 2025.

“These vulnerabilities are easily exploitable and enable authenticated/unauthenticated remote attackers to achieve remote code execution on vulnerable FreePBX instances,” stated Horizon3.ai security researcher Noah King. The flaws were fixed in versions 16.0.92 and 17.0.6 (October 14, 2025) for CVE-2025-61675 and CVE-2025-61678, and versions 16.0.44 and 17.0.23 (December 9, 2025) for CVE-2025-66039.

Additional security measures include the removal of the authentication provider selection from Advanced Settings; users must now configure it manually via the command line using fwconsole. Temporary mitigations suggest setting “Authorization Type” to “usermanager,” disabling “Override Readonly Settings,” applying configurations, and rebooting the system to terminate unauthorized sessions.

Users are warned on the dashboard that the “webserver” authentication type may offer reduced security compared to “usermanager” and should be avoided. “It is best practice not to use the authentication type webserver as it appears to be legacy code,” King emphasized.

The vulnerabilities exploit exposed code that depends on additional authentication layers to protect access, requiring an Authorization header with valid credentials in some cases, while others enable remote code execution without valid usernames. Users should analyze their systems thoroughly if “webserver” authentication was enabled inadvertently.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Google Sets 2029 Deadline for Quantum Crypto Switch

Google has declared a 2029 deadline to migrate its products to post-quantum cryptography, citing...

Crypto Developer Loses Bid for Lawsuit Protection

A federal judge dismissed a lawsuit from crypto developer Michael Lewellen seeking pre-approval for...

RBA: Tokenization Is “How, Not If” for Australia

The Reserve Bank of Australia (RBA) states that asset tokenization's future is now a...

Circle Wrongly Froze 16 Wallets: ZachXBT

Onchain investigator ZachXBT claims stablecoin issuer Circle incorrectly froze 16 USDC wallets linked to...

Google Targets 2029 Quantum Crypto Deadline, Bitcoin at Risk

Google has set a 2029 deadline to transition its systems to post-quantum cryptography, warning...

Must Read

Ethereum Hosting: TOP 10 Companies to Buy Hosting With Ethereum

If you are looking for Ethereum Hosting, you've hit the jackpot. In this article, we will present the 10 Best companies to buy hosting...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading