CVE-2025-1131 — Uncontrolled Search Path Element in Asterisk
Severity
7.0HIGHNVD
EPSS
0.1%
top 84.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 23
Latest updateSep 24
Description
A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions.
Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with…
CVSS vector
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N
Affected Packages5 packages
🔴Vulnerability Details
1OSV▶
CVE-2025-1131: A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package↗2025-09-23
📋Vendor Advisories
1Debian▶
CVE-2025-1131: asterisk - A local privilege escalation vulnerability exists in the safe_asterisk script in...↗2025
💬Community
6Bugzilla▶
CVE-2025-1131 asterisk: Asterisk Unsafe Shell Sourcing Leads to Local Privilege Escalation [epel-9]↗2025-09-24
Bugzilla▶
CVE-2025-1131 asterisk-sounds-core: Asterisk Unsafe Shell Sourcing Leads to Local Privilege Escalation [fedora-41]↗2025-09-24
Bugzilla▶
CVE-2025-1131 asterisk: Asterisk Unsafe Shell Sourcing Leads to Local Privilege Escalation [fedora-41]↗2025-09-24
Bugzilla▶
CVE-2025-1131 asterisk: Asterisk Unsafe Shell Sourcing Leads to Local Privilege Escalation [fedora-42]↗2025-09-24
Bugzilla▶
CVE-2025-1131 asterisk-sounds-core: Asterisk Unsafe Shell Sourcing Leads to Local Privilege Escalation [fedora-42]↗2025-09-24