FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, when adding and editing user records using the fill() method, there is no check for the absence of the password field in the data coming from the user, which leads to a mass-assignment vulnerability. As a result, a user with the right to edit other users of the system can change their password, and then log in to the system using the set password. This issue has been patched in version 1.8.180.
References
Link | Resource |
---|---|
https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-7h5m-q39p-h849 | Exploit Vendor Advisory |
Configurations
History
04 Jun 2025, 15:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-7h5m-q39p-h849 - Exploit, Vendor Advisory | |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Freescout freescout
Freescout |
30 May 2025, 16:31
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 May 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-30 05:15
Updated : 2025-06-04 15:36
NVD link : CVE-2025-48476
Mitre link : CVE-2025-48476
CVE.ORG link : CVE-2025-48476
JSON object : View
Products Affected
freescout
- freescout
CWE