CVE-2025-48474: CWE-863: Incorrect Authorization in freescout-help-desk freescout
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application incorrectly checks user access rights for conversations. Users with show_only_assigned_conversations enabled can assign themselves to an arbitrary conversation from the mailbox to which they have access, thereby bypassing the restriction on viewing conversations. This issue has been patched in version 1.8.180.
AI Analysis
Technical Summary
CVE-2025-48474 is a medium-severity vulnerability affecting FreeScout, a free, self-hosted help desk and shared mailbox application. The flaw exists in versions prior to 1.8.180 and relates to incorrect authorization checks (CWE-863) within the conversation access control mechanism. Specifically, when the 'show_only_assigned_conversations' feature is enabled, users are intended to see only conversations assigned to them. However, due to improper validation, a user with legitimate access to the mailbox can assign themselves to any arbitrary conversation within that mailbox. This effectively bypasses the intended restriction and grants unauthorized access to conversations that should be hidden from them. The vulnerability does not require user interaction, authentication is required but at a low privilege level, and the attack vector is network-based. The CVSS 4.0 score is 5.3 (medium), reflecting the moderate impact on confidentiality due to unauthorized data exposure, with no impact on integrity or availability. The issue was patched in FreeScout version 1.8.180, and no known exploits are currently reported in the wild. The vulnerability highlights a common authorization logic flaw where access control decisions are not properly enforced before allowing state changes (assignment) that grant broader access than intended.
Potential Impact
For European organizations using FreeScout for customer support or internal help desk functions, this vulnerability could lead to unauthorized disclosure of sensitive or confidential conversations. This may include personal data of customers or internal communications, potentially violating GDPR and other privacy regulations. The exposure of such data could damage organizational reputation, lead to regulatory fines, and undermine trust in support operations. Since FreeScout is self-hosted, organizations with lax patch management or limited security oversight are at higher risk. The vulnerability does not allow modification or deletion of data, so integrity and availability impacts are minimal. However, unauthorized access to conversations could facilitate social engineering or insider threats if sensitive information is leaked. The lack of known exploits reduces immediate risk, but the ease of exploitation (no user interaction, low privilege required) means attackers could leverage this flaw if discovered. Organizations relying on FreeScout for regulated industries (finance, healthcare, government) in Europe should prioritize remediation to maintain compliance and data confidentiality.
Mitigation Recommendations
1. Upgrade FreeScout installations to version 1.8.180 or later, where the authorization flaw has been fixed. 2. Until patching is possible, restrict access to FreeScout instances via network controls such as VPNs or IP whitelisting to limit exposure. 3. Review and audit user permissions and mailbox access configurations to ensure the 'show_only_assigned_conversations' setting is correctly applied and monitored. 4. Implement logging and alerting on conversation assignment changes to detect unusual or unauthorized self-assignment activity. 5. Conduct regular security assessments and penetration tests focusing on authorization logic to identify similar flaws. 6. Educate administrators and users about the importance of timely patching and monitoring of help desk software. 7. Consider deploying web application firewalls (WAF) with custom rules to detect and block suspicious API calls related to conversation assignment if feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-48474: CWE-863: Incorrect Authorization in freescout-help-desk freescout
Description
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application incorrectly checks user access rights for conversations. Users with show_only_assigned_conversations enabled can assign themselves to an arbitrary conversation from the mailbox to which they have access, thereby bypassing the restriction on viewing conversations. This issue has been patched in version 1.8.180.
AI-Powered Analysis
Technical Analysis
CVE-2025-48474 is a medium-severity vulnerability affecting FreeScout, a free, self-hosted help desk and shared mailbox application. The flaw exists in versions prior to 1.8.180 and relates to incorrect authorization checks (CWE-863) within the conversation access control mechanism. Specifically, when the 'show_only_assigned_conversations' feature is enabled, users are intended to see only conversations assigned to them. However, due to improper validation, a user with legitimate access to the mailbox can assign themselves to any arbitrary conversation within that mailbox. This effectively bypasses the intended restriction and grants unauthorized access to conversations that should be hidden from them. The vulnerability does not require user interaction, authentication is required but at a low privilege level, and the attack vector is network-based. The CVSS 4.0 score is 5.3 (medium), reflecting the moderate impact on confidentiality due to unauthorized data exposure, with no impact on integrity or availability. The issue was patched in FreeScout version 1.8.180, and no known exploits are currently reported in the wild. The vulnerability highlights a common authorization logic flaw where access control decisions are not properly enforced before allowing state changes (assignment) that grant broader access than intended.
Potential Impact
For European organizations using FreeScout for customer support or internal help desk functions, this vulnerability could lead to unauthorized disclosure of sensitive or confidential conversations. This may include personal data of customers or internal communications, potentially violating GDPR and other privacy regulations. The exposure of such data could damage organizational reputation, lead to regulatory fines, and undermine trust in support operations. Since FreeScout is self-hosted, organizations with lax patch management or limited security oversight are at higher risk. The vulnerability does not allow modification or deletion of data, so integrity and availability impacts are minimal. However, unauthorized access to conversations could facilitate social engineering or insider threats if sensitive information is leaked. The lack of known exploits reduces immediate risk, but the ease of exploitation (no user interaction, low privilege required) means attackers could leverage this flaw if discovered. Organizations relying on FreeScout for regulated industries (finance, healthcare, government) in Europe should prioritize remediation to maintain compliance and data confidentiality.
Mitigation Recommendations
1. Upgrade FreeScout installations to version 1.8.180 or later, where the authorization flaw has been fixed. 2. Until patching is possible, restrict access to FreeScout instances via network controls such as VPNs or IP whitelisting to limit exposure. 3. Review and audit user permissions and mailbox access configurations to ensure the 'show_only_assigned_conversations' setting is correctly applied and monitored. 4. Implement logging and alerting on conversation assignment changes to detect unusual or unauthorized self-assignment activity. 5. Conduct regular security assessments and penetration tests focusing on authorization logic to identify similar flaws. 6. Educate administrators and users about the importance of timely patching and monitoring of help desk software. 7. Consider deploying web application firewalls (WAF) with custom rules to detect and block suspicious API calls related to conversation assignment if feasible.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-22T12:11:39.118Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6838cb41182aa0cae28e884f
Added to database: 5/29/2025, 9:01:53 PM
Last enriched: 7/7/2025, 11:10:28 PM
Last updated: 7/30/2025, 4:10:55 PM
Views: 10
Related Threats
CVE-2025-8972: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-51986: n/a
UnknownCVE-2025-52335: n/a
HighCVE-2025-8971: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8970: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.