CVE-2025-1131

A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.
CVSS

No CVSS.

Configurations

No configuration.

History

23 Sep 2025, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-23 05:15

Updated : 2025-09-24 18:11


NVD link : CVE-2025-1131

Mitre link : CVE-2025-1131

CVE.ORG link : CVE-2025-1131


JSON object : View

Products Affected

No product.

CWE
CWE-427

Uncontrolled Search Path Element