module

FreePBX Custom Extension SQL Injection

Disclosed
Dec 11, 2025
Created
Jan 28, 2026

Description

FreePBX versions prior to 16.0.44,16.0.92 and 17.0.23,17.0.6 are vulnerable to multiple CVEs, specifically CVE-2025-66039 and CVE-2025-61675, in the context of this module. The versions before 16.0.44 and 17.0.23 are vulnerable to CVE-2025-66039, while versions before 16.0.92 and 17.0.6 are vulnerable to CVE-2025-61675. The former represents an authentication bypass: when FreePBX uses Webserver Authorization Mode (an option the admin can enable), it allows an attacker to authenticate as any user. The latter CVE describes multiple SQL injections; this module exploits the SQL injection in the custom extension component. The module chains these vulnerabilities into an unauthenticated SQL injection attack that creates a new administrative user.

Authors

Noah King
msutovsky-r7

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/gather/freepbx_custom_extension_injection
msf auxiliary(freepbx_custom_extension_injection) > show actions
...actions...
msf auxiliary(freepbx_custom_extension_injection) > set ACTION < action-name >
msf auxiliary(freepbx_custom_extension_injection) > show options
...show and set options...
msf auxiliary(freepbx_custom_extension_injection) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.