CVE-2025-1131
HIGHSangoma Asterisk < 18.26.3 - Uncontrolled Search Path
Title source: ruleDescription
A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.
Scores
CVSS v3
7.8
EPSS
0.0004
EPSS Percentile
11.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-427
Status
published
Products (3)
sangoma/asterisk
< 18.26.3
sangoma/certified_asterisk
18.9 cert1 (18 CPE variants)
sangoma/certified_asterisk
20.7 cert1 (8 CPE variants)
Published
Sep 23, 2025
Tracked Since
Feb 18, 2026