CVE-2025-48473: CWE-863: Incorrect Authorization in freescout-help-desk freescout
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.179, when creating a conversation from a message in another conversation, there is no check to ensure that the user has the ability to view this message. Thus, the user can view arbitrary messages from other mailboxes or from other conversations to which they do not have access (access restriction to conversations is implemented by the show_only_assigned_conversations setting, which is also not checked). This issue has been patched in version 1.8.179.
AI Analysis
Technical Summary
CVE-2025-48473 is an authorization vulnerability identified in FreeScout, a free self-hosted help desk and shared mailbox software. The flaw exists in versions prior to 1.8.179. Specifically, when a user attempts to create a new conversation from a message that belongs to another conversation, the system fails to verify whether the user has permission to view that original message. This bypasses the intended access control mechanism, notably the 'show_only_assigned_conversations' setting, which is designed to restrict users to only see conversations assigned to them. Due to this improper authorization check, a user with limited privileges can access arbitrary messages from other mailboxes or conversations they should not have access to. This vulnerability is classified under CWE-863 (Incorrect Authorization), indicating a failure to enforce proper access controls. The CVSS v4.0 base score is 5.3 (medium severity), reflecting that the vulnerability can be exploited remotely without user interaction or authentication but requires low privileges (limited user). The impact primarily affects confidentiality and integrity, as unauthorized users can read messages they should not see, potentially exposing sensitive information. The vulnerability has been patched in FreeScout version 1.8.179, and users are advised to upgrade to this or later versions to remediate the issue. There are no known exploits in the wild at the time of publication.
Potential Impact
For European organizations using FreeScout as their help desk or shared mailbox solution, this vulnerability poses a significant risk to data confidentiality and privacy. Unauthorized access to messages could lead to leakage of sensitive customer data, internal communications, or personally identifiable information (PII), potentially violating GDPR and other data protection regulations. The breach of confidentiality could damage organizational reputation and result in regulatory fines. Additionally, unauthorized users might manipulate or misuse information obtained from other conversations, impacting data integrity and trustworthiness of the help desk system. Since FreeScout is often used by SMEs and public sector entities for customer support, the exposure could affect critical communication channels. The medium severity score suggests that while the vulnerability is not trivially exploitable by unauthenticated attackers, any user with limited access privileges can exploit it, increasing the attack surface within an organization. This is particularly concerning in environments with multiple users having different access levels. The lack of user interaction requirement means exploitation can be automated or performed stealthily once access is gained.
Mitigation Recommendations
1. Immediate upgrade of FreeScout installations to version 1.8.179 or later, where the authorization check has been properly implemented. 2. Conduct an internal audit of user permissions and access controls within FreeScout to ensure that only authorized personnel have access to sensitive conversations. 3. Implement strict role-based access controls (RBAC) and review the configuration of the 'show_only_assigned_conversations' setting to ensure it is enabled and correctly enforced. 4. Monitor logs for unusual access patterns or attempts to create conversations from messages outside assigned mailboxes, which could indicate exploitation attempts. 5. If upgrading immediately is not feasible, consider restricting user capabilities temporarily to minimize the risk of unauthorized message access. 6. Educate help desk staff and administrators about the vulnerability and encourage vigilance regarding suspicious activity. 7. Regularly review and apply security patches for all components of the help desk infrastructure to reduce exposure to similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-48473: CWE-863: Incorrect Authorization in freescout-help-desk freescout
Description
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.179, when creating a conversation from a message in another conversation, there is no check to ensure that the user has the ability to view this message. Thus, the user can view arbitrary messages from other mailboxes or from other conversations to which they do not have access (access restriction to conversations is implemented by the show_only_assigned_conversations setting, which is also not checked). This issue has been patched in version 1.8.179.
AI-Powered Analysis
Technical Analysis
CVE-2025-48473 is an authorization vulnerability identified in FreeScout, a free self-hosted help desk and shared mailbox software. The flaw exists in versions prior to 1.8.179. Specifically, when a user attempts to create a new conversation from a message that belongs to another conversation, the system fails to verify whether the user has permission to view that original message. This bypasses the intended access control mechanism, notably the 'show_only_assigned_conversations' setting, which is designed to restrict users to only see conversations assigned to them. Due to this improper authorization check, a user with limited privileges can access arbitrary messages from other mailboxes or conversations they should not have access to. This vulnerability is classified under CWE-863 (Incorrect Authorization), indicating a failure to enforce proper access controls. The CVSS v4.0 base score is 5.3 (medium severity), reflecting that the vulnerability can be exploited remotely without user interaction or authentication but requires low privileges (limited user). The impact primarily affects confidentiality and integrity, as unauthorized users can read messages they should not see, potentially exposing sensitive information. The vulnerability has been patched in FreeScout version 1.8.179, and users are advised to upgrade to this or later versions to remediate the issue. There are no known exploits in the wild at the time of publication.
Potential Impact
For European organizations using FreeScout as their help desk or shared mailbox solution, this vulnerability poses a significant risk to data confidentiality and privacy. Unauthorized access to messages could lead to leakage of sensitive customer data, internal communications, or personally identifiable information (PII), potentially violating GDPR and other data protection regulations. The breach of confidentiality could damage organizational reputation and result in regulatory fines. Additionally, unauthorized users might manipulate or misuse information obtained from other conversations, impacting data integrity and trustworthiness of the help desk system. Since FreeScout is often used by SMEs and public sector entities for customer support, the exposure could affect critical communication channels. The medium severity score suggests that while the vulnerability is not trivially exploitable by unauthenticated attackers, any user with limited access privileges can exploit it, increasing the attack surface within an organization. This is particularly concerning in environments with multiple users having different access levels. The lack of user interaction requirement means exploitation can be automated or performed stealthily once access is gained.
Mitigation Recommendations
1. Immediate upgrade of FreeScout installations to version 1.8.179 or later, where the authorization check has been properly implemented. 2. Conduct an internal audit of user permissions and access controls within FreeScout to ensure that only authorized personnel have access to sensitive conversations. 3. Implement strict role-based access controls (RBAC) and review the configuration of the 'show_only_assigned_conversations' setting to ensure it is enabled and correctly enforced. 4. Monitor logs for unusual access patterns or attempts to create conversations from messages outside assigned mailboxes, which could indicate exploitation attempts. 5. If upgrading immediately is not feasible, consider restricting user capabilities temporarily to minimize the risk of unauthorized message access. 6. Educate help desk staff and administrators about the vulnerability and encourage vigilance regarding suspicious activity. 7. Regularly review and apply security patches for all components of the help desk infrastructure to reduce exposure to similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-22T12:11:39.118Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683880c6182aa0cae2839697
Added to database: 5/29/2025, 3:44:06 PM
Last enriched: 7/7/2025, 11:12:33 PM
Last updated: 7/30/2025, 4:10:55 PM
Views: 11
Related Threats
CVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.