CrowdSec
7/10CrowdSec Score

FreePBX - SQLi (CVE-2025-57819)

Published on28-08-2025
First seen on20-09-2025

209Exploiting IPs reported

FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3.

CrowdSec analysis

CVE-2025-57819 is a critical vulnerability in FreePBX versions 15, 16, and 17 that allows unauthenticated attackers to access the FreePBX Administrator interface due to improper sanitization of user input. Exploiting this flaw can lead to arbitrary database manipulation and remote code execution, making it possible for attackers to fully compromise affected systems.

CrowdSec has been tracking this vulnerability and its exploits since 19th of September 2025.

According to CrowdSec data, while opportunistic exploitation dominates, a portion of threat actors trying to exploit CVE-2025-57819 apply basic targeting methods such as port or service detection. This indicates emerging patterns of selective targeting. CrowdSec data also reveals a clear uptick in attacks involving CVE-2025-57819 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.

Attackers exploit FreePBX by sending crafted requests to /admin/ajax.php with malicious SQL code in the brand parameter, enabling unauthenticated remote code execution and manipulation of backend cron jobs. Subsequent requests may target dynamically created PHP files in the web root to execute arbitrary commands.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.