BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Critical FreePBX Flaws Expose PBX to Authentication Bypass Risks

Critical Security Vulnerabilities Discovered and Fixed in FreePBX Including Authentication Bypass and Remote Code Execution Risks

  • Several security vulnerabilities were found in the open-source PBX platform FreePBX, including a critical authentication bypass.
  • The flaws include SQL injection, arbitrary file upload, and authentication bypass vulnerabilities, all disclosed after discovery in September 2025.
  • The critical authentication bypass affects systems configured with the “webserver” Authorization Type and allows unauthorized administrative access.
  • These vulnerabilities have been fixed in recent software versions, and temporary mitigations are recommended until updates are applied.
  • Users are advised to avoid the legacy “webserver” authentication type due to reduced security risks.

FreePBX, an open-source private branch exchange platform, was found to have multiple security vulnerabilities disclosed in December 2025. The issues were discovered by Horizon3.ai and reported on September 15, 2025. These vulnerabilities include a critical authentication bypass that can allow unauthorized access under certain configurations.

- Advertisement -

The disclosed security flaws are as follows:

CVE-2025-61675: An authenticated SQL injection vulnerability affecting four endpoints and 11 parameters. This flaw allows attackers to read and modify the underlying SQL database with a CVSS score of 8.6.

CVE-2025-61678: An authenticated arbitrary file upload vulnerability. Attackers with a valid PHPSESSID can upload a PHP web shell through the firmware upload endpoint, execute arbitrary commands, and access sensitive files such as “/etc/passwd” (CVSS score: 8.6).

CVE-2025-66039: A high-severity authentication bypass vulnerability (CVSS score: 9.3). When the “Authorization Type” is set to “webserver,” attackers can log in to the Administrator Control Panel using a forged Authorization header.

- Advertisement -

This authentication bypass is not exploitable by default since the “Authorization Type” option appears only if three specific settings—Display Friendly Name, Display Readonly Settings, and Override Readonly Settings—are all enabled in the Advanced Settings panel. If enabled, attackers can bypass authentication and insert malicious users into the “ampusers” database, similar to a previously known vulnerability, CVE-2025-57819, which was actively exploited in September 2025.

“These vulnerabilities are easily exploitable and enable authenticated/unauthenticated remote attackers to achieve remote code execution on vulnerable FreePBX instances,” stated Horizon3.ai security researcher Noah King. The flaws were fixed in versions 16.0.92 and 17.0.6 (October 14, 2025) for CVE-2025-61675 and CVE-2025-61678, and versions 16.0.44 and 17.0.23 (December 9, 2025) for CVE-2025-66039.

Additional security measures include the removal of the authentication provider selection from Advanced Settings; users must now configure it manually via the command line using fwconsole. Temporary mitigations suggest setting “Authorization Type” to “usermanager,” disabling “Override Readonly Settings,” applying configurations, and rebooting the system to terminate unauthorized sessions.

Users are warned on the dashboard that the “webserver” authentication type may offer reduced security compared to “usermanager” and should be avoided. “It is best practice not to use the authentication type webserver as it appears to be legacy code,” King emphasized.

The vulnerabilities exploit exposed code that depends on additional authentication layers to protect access, requiring an Authorization header with valid credentials in some cases, while others enable remote code execution without valid usernames. Users should analyze their systems thoroughly if “webserver” authentication was enabled inadvertently.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Musk Dissolves xAI Into SpaceX As Orbital AI Plans Ramp

Elon Musk announced the dissolution of xAI and its full integration into SpaceX as...

Bitcoin Dominance Hits 61%, Altcoin Recovery Shows Early Signs

Bitcoin's market dominance surged to 61% this Wednesday, its highest point since November 2025,...

New botnet targets Android TVs, IoT devices

A new Mirai-derived botnet called xlabs_v1 is targeting internet-exposed Android devices to build a...

Corning Stock Up 9% on $500M Nvidia Deal

Corning stock surged 9% to a record high after announcing a $500 million deal...

Bittrex Seeks $24M SEC Settlement Refund After Policy Shift

Defunct crypto exchange Bittrex is asking a federal judge to overturn its 2023 settlement...

Must Read

Top 7 BEST Crypto Trading Bots for Beginners

QUICK NAVIGATIONQuick Look: Top 3 Best Crypto Trading BotsWhat Exactly is a Crypto Trading Bot?How I Chose These Trading BotsTop 7 Crypto Trading Bots...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading