CVE-2025-1131

HIGH

Sangoma Asterisk < 18.26.3 - Uncontrolled Search Path

Title source: rule
STIX 2.1

Description

A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.

Scores

CVSS v3 7.8
EPSS 0.0004
EPSS Percentile 11.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-427
Status published
Products (3)
sangoma/asterisk < 18.26.3
sangoma/certified_asterisk 18.9 cert1 (18 CPE variants)
sangoma/certified_asterisk 20.7 cert1 (8 CPE variants)
Published Sep 23, 2025
Tracked Since Feb 18, 2026