CVE-2025-48478

4.9 MEDIUM

📋 TL;DR

FreeScout versions before 1.8.180 have a mass assignment vulnerability during user creation that allows attackers to manipulate all fields in the User object. This affects all FreeScout instances running vulnerable versions, potentially allowing unauthorized privilege escalation or data manipulation.

💻 Affected Systems

Products:
  • FreeScout Help Desk
Versions: All versions prior to 1.8.180
Operating Systems: All platforms running FreeScout
Default Config Vulnerable: ⚠️ Yes
Notes: All FreeScout installations with user creation functionality enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker creates admin user with full system privileges, takes complete control of help desk system, accesses sensitive customer data, and modifies system configurations.

🟠

Likely Case

Attacker creates unauthorized user accounts with elevated privileges, accesses restricted help desk data, or modifies user permissions.

🟢

If Mitigated

Attack is detected and blocked by input validation controls or network segmentation, limiting impact to isolated help desk instance.

🌐 Internet-Facing: HIGH - FreeScout is typically deployed as internet-facing help desk software, making it directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal deployments still vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to user creation endpoint, which typically requires some level of authentication, but could be combined with other vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.180

Vendor Advisory: https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-fqjj-79j2-8qx6

Restart Required: Yes

Instructions:

1. Backup your FreeScout database and files. 2. Download version 1.8.180 from GitHub. 3. Replace existing files with new version. 4. Run database migrations if needed. 5. Restart web server.

🔧 Temporary Workarounds

Disable User Registration

all

Temporarily disable new user registration functionality in FreeScout settings

Web Application Firewall Rules

all

Implement WAF rules to block mass assignment patterns in user creation requests

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the user creation endpoints
  • Enable detailed logging and monitoring of all user creation activities for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check FreeScout version in admin panel or by examining the application files. Versions below 1.8.180 are vulnerable.

Check Version:

Check /app/version file or admin panel at /admin/settings/general

Verify Fix Applied:

After patching, verify version shows 1.8.180 or higher in admin panel. Test user creation with various input parameters to ensure only allowed fields are accepted.

📡 Detection & Monitoring

Log Indicators:

  • Multiple user creation attempts with unusual field names
  • User creation with admin or elevated privilege fields
  • Rapid succession of user creation requests

Network Indicators:

  • POST requests to user creation endpoints with unexpected parameters
  • HTTP requests containing fields not in standard user creation forms

SIEM Query:

source="freescout-logs" AND (event="user_created" AND (parameters CONTAINS "admin" OR parameters CONTAINS "role" OR parameters CONTAINS "permission"))

🔗 References

📤 Share & Export