CVE-2025-12205
low-risk
Published 2025-10-27
A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The real existence of this vulnerability is still doubted at the moment. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.
Do I need to act?
-
0.02% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
LOCAL
/ LOW complexity
Affected Products (1)
Kamailio
Affected Vendors
References (8)
Permissions Required
https://vuldb.com/?ctiid.329875
Third Party Advisory
https://vuldb.com/?id.329875
Third Party Advisory
https://vuldb.com/?submit.673225
Issue Tracking
https://www.openwall.com/lists/oss-security/2025/10/27/8
23
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal