Skip to main content

CVE-2025-48474: CWE-863: Incorrect Authorization in freescout-help-desk freescout

Medium
VulnerabilityCVE-2025-48474cvecve-2025-48474cwe-863
Published: Thu May 29 2025 (05/29/2025, 15:55:47 UTC)
Source: CVE Database V5
Vendor/Project: freescout-help-desk
Product: freescout

Description

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application incorrectly checks user access rights for conversations. Users with show_only_assigned_conversations enabled can assign themselves to an arbitrary conversation from the mailbox to which they have access, thereby bypassing the restriction on viewing conversations. This issue has been patched in version 1.8.180.

AI-Powered Analysis

AILast updated: 07/07/2025, 23:10:28 UTC

Technical Analysis

CVE-2025-48474 is a medium-severity vulnerability affecting FreeScout, a free, self-hosted help desk and shared mailbox application. The flaw exists in versions prior to 1.8.180 and relates to incorrect authorization checks (CWE-863) within the conversation access control mechanism. Specifically, when the 'show_only_assigned_conversations' feature is enabled, users are intended to see only conversations assigned to them. However, due to improper validation, a user with legitimate access to the mailbox can assign themselves to any arbitrary conversation within that mailbox. This effectively bypasses the intended restriction and grants unauthorized access to conversations that should be hidden from them. The vulnerability does not require user interaction, authentication is required but at a low privilege level, and the attack vector is network-based. The CVSS 4.0 score is 5.3 (medium), reflecting the moderate impact on confidentiality due to unauthorized data exposure, with no impact on integrity or availability. The issue was patched in FreeScout version 1.8.180, and no known exploits are currently reported in the wild. The vulnerability highlights a common authorization logic flaw where access control decisions are not properly enforced before allowing state changes (assignment) that grant broader access than intended.

Potential Impact

For European organizations using FreeScout for customer support or internal help desk functions, this vulnerability could lead to unauthorized disclosure of sensitive or confidential conversations. This may include personal data of customers or internal communications, potentially violating GDPR and other privacy regulations. The exposure of such data could damage organizational reputation, lead to regulatory fines, and undermine trust in support operations. Since FreeScout is self-hosted, organizations with lax patch management or limited security oversight are at higher risk. The vulnerability does not allow modification or deletion of data, so integrity and availability impacts are minimal. However, unauthorized access to conversations could facilitate social engineering or insider threats if sensitive information is leaked. The lack of known exploits reduces immediate risk, but the ease of exploitation (no user interaction, low privilege required) means attackers could leverage this flaw if discovered. Organizations relying on FreeScout for regulated industries (finance, healthcare, government) in Europe should prioritize remediation to maintain compliance and data confidentiality.

Mitigation Recommendations

1. Upgrade FreeScout installations to version 1.8.180 or later, where the authorization flaw has been fixed. 2. Until patching is possible, restrict access to FreeScout instances via network controls such as VPNs or IP whitelisting to limit exposure. 3. Review and audit user permissions and mailbox access configurations to ensure the 'show_only_assigned_conversations' setting is correctly applied and monitored. 4. Implement logging and alerting on conversation assignment changes to detect unusual or unauthorized self-assignment activity. 5. Conduct regular security assessments and penetration tests focusing on authorization logic to identify similar flaws. 6. Educate administrators and users about the importance of timely patching and monitoring of help desk software. 7. Consider deploying web application firewalls (WAF) with custom rules to detect and block suspicious API calls related to conversation assignment if feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-22T12:11:39.118Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6838cb41182aa0cae28e884f

Added to database: 5/29/2025, 9:01:53 PM

Last enriched: 7/7/2025, 11:10:28 PM

Last updated: 7/30/2025, 4:10:55 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats