CVE-2025-48481

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers with unactivated email invitations to self-activate blocked or deleted accounts in FreeScout help desk software. Attackers can gain unauthorized access to accounts by exploiting invitation links. All FreeScout instances prior to version 1.8.180 are affected.

💻 Affected Systems

Products:
  • FreeScout Help Desk
Versions: All versions prior to 1.8.180
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all FreeScout installations using email invitations for user onboarding.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to help desk accounts, potentially accessing sensitive customer communications, internal data, and using legitimate accounts for further attacks.

🟠

Likely Case

Unauthorized users activate accounts they shouldn't have access to, potentially viewing or responding to customer support tickets, accessing internal communications, or performing actions as legitimate users.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized account activation which can be detected and remediated quickly.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires an unactivated email invitation (invite_hash). The advisory provides technical details but no public exploit code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.180

Vendor Advisory: https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-jgj2-x749-5wc7

Restart Required: Yes

Instructions:

1. Backup your FreeScout installation and database. 2. Update to version 1.8.180 or later via the FreeScout update mechanism or manual installation. 3. Restart the web server/service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable Email Invitations

all

Temporarily disable email invitation functionality to prevent exploitation

Monitor Account Activations

all

Implement enhanced monitoring for account activation events

🧯 If You Can't Patch

  • Disable all email invitation functionality immediately
  • Review and audit all recently activated accounts for unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check FreeScout version in admin panel or via version file. If version is below 1.8.180, the system is vulnerable.

Check Version:

Check /app/version.txt or admin panel version display

Verify Fix Applied:

Verify version is 1.8.180 or higher in admin panel. Test that blocked/deleted accounts cannot be activated via invitation links.

📡 Detection & Monitoring

Log Indicators:

  • Unusual account activation events
  • Account activations from blocked/deleted users
  • Multiple activation attempts from same IP

Network Indicators:

  • HTTP requests to invitation activation endpoints with unusual patterns

SIEM Query:

source="freescout-logs" AND (event="account_activation" AND (user_status="blocked" OR user_status="deleted"))

🔗 References

📤 Share & Export