{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-67722","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-12-10T18:46:14.763Z","datePublished":"2025-12-16T00:14:18.746Z","dateUpdated":"2026-02-26T16:07:34.753Z"},"containers":{"cna":{"title":"Authenticated amportal search for ‘freepbx_engine’ in non root writeable directories leads to potential privilege escalation","problemTypes":[{"descriptions":[{"cweId":"CWE-426","lang":"en","description":"CWE-426: Untrusted Search Path","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":5.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U","version":"4.0"}}],"references":[{"name":"https://github.com/FreePBX/security-reporting/security/advisories/GHSA-p42w-v77m-hfp8","tags":["x_refsource_CONFIRM"],"url":"https://github.com/FreePBX/security-reporting/security/advisories/GHSA-p42w-v77m-hfp8"},{"name":"https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80","tags":["x_refsource_MISC"],"url":"https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80"}],"affected":[{"vendor":"FreePBX","product":"framework","versions":[{"version":"< 16.0.45","status":"affected"},{"version":">= 17.0.0, < 17.0.24","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-13T22:11:11.719Z"},"descriptions":[{"lang":"en","value":"FreePBX is an open-source web-based graphical user interface (GUI) that manages Asterisk. Prior to versions 16.0.45 and 17.0.24 of the FreePBX framework, an authenticated local privilege escalation exists in the deprecated FreePBX startup script `amportal`. In the deprecated `amportal` utility, the lookup for the `freepbx_engine` file occurs in `/etc/asterisk/` directories. Typically, these are configured by FreePBX as writable by the **asterisk** user and any members of the **asterisk** group. This means that a member of the **asterisk** group can add their own `freepbx_engine` file in `/etc/asterisk/` and upon `amportal` executing, it would exec that file with root permissions (even though the file was created and placed by a non-root user). Version 16.0.45 and 17.0.24 contain a fix for the issue. Other mitigation strategies are also available. Confirm only trusted local OS system users are members of the `asterisk` group. Look for suspicious files in the `/etc/asterisk/` directory (via Admin -> Config Edit in the GUI, or via CLI). Double-check that `live_dangerously = no` is set (or unconfigured, as the default is **no**) in `/etc/asterisk/asterisk.conf` file. Eliminate any unsafe custom use of Asterisk dial plan applications and functions that potentially can manipulate the file system, e.g., System(), FILE(), etc."}],"source":{"advisory":"GHSA-p42w-v77m-hfp8","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-67722","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-12-17T04:56:05.966962Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T16:07:34.753Z"}}]}}