CVE-2025-48390
📋 TL;DR
FreeScout versions before 1.8.178 contain a code injection vulnerability in the php_path parameter. Administrators can exploit this to execute arbitrary system commands via backticks, potentially leading to full server compromise. Only FreeScout instances with administrator accounts are affected.
💻 Affected Systems
- FreeScout
📦 What is this software?
Freescout by Freescout
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise with attacker gaining root/system privileges, data exfiltration, ransomware deployment, or complete system takeover.
Likely Case
Unauthorized command execution leading to data theft, installation of backdoors, or lateral movement within the network.
If Mitigated
Limited impact due to proper access controls, but still potential for data exposure if exploited.
🎯 Exploit Status
Exploitation requires administrator credentials. The vulnerability is straightforward to exploit once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.8.178
Vendor Advisory: https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-5324-cw55-gwj5
Restart Required: No
Instructions:
1. Backup your FreeScout installation and database. 2. Download version 1.8.178 from the official repository. 3. Replace all files with the new version. 4. Clear any caches if applicable.
🔧 Temporary Workarounds
Input Sanitization
allManually sanitize php_path parameter input to remove backticks and other dangerous characters
Edit tools.php to add input validation before file_exists() calls
Access Restriction
allTemporarily restrict administrator access to only trusted users
🧯 If You Can't Patch
- Immediately revoke administrator privileges from all non-essential users
- Implement network segmentation to isolate FreeScout server from critical systems
🔍 How to Verify
Check if Vulnerable:
Check FreeScout version in admin panel or by examining version files. If version is below 1.8.178, system is vulnerable.
Check Version:
grep -r 'version' /path/to/freescout/app/Config/app.php | grep -i version
Verify Fix Applied:
Confirm version is 1.8.178 or higher in admin panel. Test php_path parameter with backticks to ensure no command execution occurs.
📡 Detection & Monitoring
Log Indicators:
- Unusual administrator activity
- php_path parameter containing backticks in access logs
- Unexpected system command execution in server logs
Network Indicators:
- Unusual outbound connections from FreeScout server
- Suspicious file transfers
SIEM Query:
source="freescout_logs" AND (php_path CONTAINS "`" OR command="file_exists")