FreePBX - SQLi (CVE-2025-57819)
457Exploiting IPs reported
FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3.
CrowdSec analysis
CVE-2025-57819 is a critical vulnerability in FreePBX versions 15, 16, and 17 that allows unauthenticated attackers to access the FreePBX Administrator interface due to improper sanitization of user input. Exploiting this flaw can lead to arbitrary database manipulation and remote code execution, making it possible for attackers to fully compromise affected systems.
CrowdSec has been tracking this vulnerability and its exploits since 19th of September 2025.
CrowdSec network data shows that most actors exploiting CVE-2025-57819 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. Telemetry from the CrowdSec network also shows that exploitation activity for CVE-2025-57819 remains steady week-over-week. Attack volumes are consistent with long-term trends, indicating sustained interest from threat actors. CVE-2025-57819 continues to be an active part of the threat landscape and will likely remain this way for the forseeable future.
Attackers exploit FreePBX by sending crafted requests to /admin/ajax.php with malicious SQL code in the brand parameter, enabling unauthenticated remote code execution and manipulation of backend cron jobs. Subsequent requests may target dynamically created PHP files in the web root to execute arbitrary commands.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.