Cyber Posture

CVE-2025-66039

Critical

Published: 09 December 2025

Published
09 December 2025
Modified
02 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.2463 96.2th percentile
Risk Priority 34 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-66039 is a critical-severity Improper Authentication (CWE-287) vulnerability in Sangoma Freepbx. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 3.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-2 (Identification and Authentication (Organizational Users)).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Remediating the authentication bypass flaw by patching FreePBX Endpoint Manager to versions 16.0.44 or 17.0.23 directly prevents exploitation of CVE-2025-66039.

prevent

Requiring unique identification and authentication for organizational users prevents the arbitrary Authorization header from bypassing credentials in the Endpoint Manager module.

prevent

Enforcing approved authorizations ensures that manipulated Authorization headers do not grant unauthorized sessions to target users in FreePBX systems.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2025-66039 is an authentication bypass in the public-facing FreePBX Endpoint Manager web module, enabling remote unauthenticated exploitation for unauthorized access, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated…

more

with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

Deeper analysisAI

CVE-2025-66039 is an authentication bypass vulnerability in the FreePBX Endpoint Manager module, which manages telephony endpoints in FreePBX systems. The flaw occurs when the authentication type is configured to "webserver," allowing an attacker to supply an arbitrary value in the Authorization HTTP header. This results in a valid session being associated with the target user, bypassing the need for legitimate credentials. Affected versions are those prior to 16.0.44 and 17.0.23, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and mapped to CWE-287 (Improper Authentication).

Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. By crafting a request with a manipulated Authorization header targeting a specific user, an attacker can impersonate that user and gain unauthorized access to the Endpoint Manager functionality. This enables full control over telephony endpoint configurations, potentially leading to high confidentiality, integrity, and availability impacts, such as reconfiguring devices, intercepting calls, or disrupting PBX operations.

Mitigation is available through upgrading to FreePBX Endpoint Manager versions 16.0.44 or 17.0.23, which address the issue as detailed in the project's GitHub security advisory (GHSA-9jvh-mv6x-w698) and a specific framework commit. FreePBX has also published guidance on their security practices in a related blog post, emphasizing prompt patching for exposed systems.

Details

CWE(s)

Affected Products

sangoma
freepbx
≤ 16.0.44 · 17.0.1 — 17.0.23

CVEs Like This One

CVE-2026-28284Same product: Sangoma Freepbx
CVE-2026-28209Same product: Sangoma Freepbx
CVE-2024-58294Same product: Sangoma Freepbx
CVE-2026-28210Same product: Sangoma Freepbx
CVE-2025-57819Same product: Sangoma Freepbx
CVE-2026-28287Same product: Sangoma Freepbx
CVE-2025-55210Same product: Sangoma Freepbx
CVE-2024-57520Same vendor: Sangoma
CVE-2025-65128Shared CWE-287
CVE-2026-34121Shared CWE-287

References