kamailio CVE Vulnerabilities & Metrics

Focus on kamailio vulnerabilities and metrics.

Last updated: 25 Nov 2025, 23:25 UTC

About kamailio Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with kamailio. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total kamailio CVEs: 13
Earliest CVE date: 11 Apr 2016, 15:59 UTC
Latest CVE date: 27 Oct 2025, 03:15 UTC

Latest CVE reference: CVE-2025-12207

Rolling Stats

30-day Count (Rolling): 4
365-day Count (Rolling): 4

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical kamailio CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.13

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 5
7.0-8.9 4
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS kamailio CVEs

These are the five CVEs with the highest CVSS scores for kamailio, sorted by severity first and recency.

All CVEs for kamailio

CVE-2025-12207 kamailio vulnerability CVSS: 1.7 27 Oct 2025, 03:15 UTC

A vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The actual existence of this vulnerability is currently in question. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-12206 kamailio vulnerability CVSS: 1.7 27 Oct 2025, 03:15 UTC

A flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. It is still unclear if this vulnerability genuinely exists. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-12205 kamailio vulnerability CVSS: 4.3 27 Oct 2025, 03:15 UTC

A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The real existence of this vulnerability is still doubted at the moment. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-12204 kamailio vulnerability CVSS: 4.3 27 Oct 2025, 03:15 UTC

A security vulnerability has been detected in Kamailio 5.5. Impacted is the function rve_destroy of the file src/core/rvalue.c of the component Configuration File Handler. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. There is ongoing doubt regarding the real existence of this vulnerability. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2020-27507 kamailio vulnerability CVSS: 0 15 Mar 2023, 20:15 UTC

The Kamailio SIP before 5.5.0 server mishandles INVITE requests with duplicated fields and overlength tag, leading to a buffer overflow that crashes the server or possibly have unspecified other impact.

CVE-2020-28361 kamailio vulnerability CVSS: 5.5 18 Nov 2020, 14:15 UTC

Kamailio before 5.4.0, as used in Sip Express Router (SER) in Sippy Softswitch 4.5 through 5.2 and other products, allows a bypass of a header-removal protection mechanism via whitespace characters. This occurs in the remove_hf function in the Kamailio textops module. Particular use of remove_hf in Sippy Softswitch may allow skilled attacker having a valid credential in the system to disrupt internal call start/duration accounting mechanisms leading potentially to a loss of revenue.

CVE-2018-16657 kamailio vulnerability CVSS: 7.5 07 Sep 2018, 14:29 UTC

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with an invalid Via header causes a segmentation fault and crashes Kamailio. The reason is missing input validation in the crcitt_string_array core function for calculating a CRC hash for To tags. (An additional error is present in the check_via_address core function: this function also misses input validation.) This could result in denial of service and potentially the execution of arbitrary code.

CVE-2018-14767 kamailio vulnerability CVSS: 7.5 31 Jul 2018, 06:29 UTC

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.

CVE-2018-8828 kamailio vulnerability CVSS: 7.5 20 Mar 2018, 20:29 UTC

A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x before 5.0.6, and 5.1.x before 5.1.2. A specially crafted REGISTER message with a malformed branch or From tag triggers an off-by-one heap-based buffer overflow in the tmx_check_pretran function in modules/tmx/tmx_pretran.c.

CVE-2015-1590 kamailio vulnerability CVSS: 4.6 07 Sep 2017, 14:29 UTC

The kamcmd administrative utility and default configuration in kamailio before 4.3.0 use /tmp/kamailio_ctl.

CVE-2013-7426 kamailio vulnerability CVSS: 7.5 29 Aug 2017, 20:29 UTC

Insecure Temporary file vulnerability in /tmp/kamailio_fifo in kamailio 4.0.1.

CVE-2015-1591 kamailio vulnerability CVSS: 4.6 27 Jun 2017, 20:29 UTC

The kamailio build in kamailio before 4.2.0-2 process allows local users to gain privileges.

CVE-2016-2385 kamailio vulnerability CVSS: 10.0 11 Apr 2016, 15:59 UTC

Heap-based buffer overflow in the encode_msg function in encode_msg.c in the SEAS module in Kamailio (formerly OpenSER and SER) before 4.3.5 allows remote attackers to cause a denial of service (memory corruption and process crash) or possibly execute arbitrary code via a large SIP packet.