CVE-2025-58163

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Versions 1.8.185 and earlier contain a deserialization of untrusted data vulnerability that allows authenticated attackers with knowledge of the application's APP_KEY to achieve remote code execution. The vulnerability is exploited via endpoint, e.g.: `/help/{mailbox_id}/auth/{customer_id}/{hash}/{timestamp}` where the `customer_id` and `timestamp` parameters are processed through the decrypt function in `app/Helper.php` without proper validation. The code decrypts using Laravel's built-in encryption functions, which subsequently deserialize the decrypted payload without sanitization, allowing attackers to craft malicious serialized PHP objects using classes to trigger arbitrary command execution. This is fixed in version 1.8.186.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*

History

08 Sep 2025, 15:03

Type Values Removed Values Added
CPE cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*
References () https://github.com/freescout-help-desk/freescout/commit/e2de65f3f32f825b4ec5558643ed81438c9a6bc6 - () https://github.com/freescout-help-desk/freescout/commit/e2de65f3f32f825b4ec5558643ed81438c9a6bc6 - Patch
References () https://github.com/freescout-help-desk/freescout/releases/tag/1.8.186 - () https://github.com/freescout-help-desk/freescout/releases/tag/1.8.186 - Release Notes
References () https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-j94w-q9gj-c37g - () https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-j94w-q9gj-c37g - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Freescout
Freescout freescout

03 Sep 2025, 03:15

Type Values Removed Values Added
References
  • {'url': 'https://github.com/freescout-help-desk/freescout/commit/1794763bbb17509af3183e667d695056545ef62a', 'source': 'security-advisories@github.com'}
  • () https://github.com/freescout-help-desk/freescout/commit/e2de65f3f32f825b4ec5558643ed81438c9a6bc6 -
Summary (en) FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. In versions 1.8.185 and below, the application performs deserialization of data that can allow authenticated attackers with knowledge of the application's APP_KEY to achieve remote code execution. The vulnerability can be exploited via endpoint: `/help/{mailbox_id}/auth/{customer_id}/{hash}/{timestamp}` where the `customer_id` and `timestamp` parameters are processed through the decrypt function in `app/Helper.php` without proper validation. The vulnerable code performs decryption using Laravel's built-in encryption functions, which subsequently deserializes the decrypted payload without sanitization. This is fixed in version 1.8.186. (en) FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Versions 1.8.185 and earlier contain a deserialization of untrusted data vulnerability that allows authenticated attackers with knowledge of the application's APP_KEY to achieve remote code execution. The vulnerability is exploited via endpoint, e.g.: `/help/{mailbox_id}/auth/{customer_id}/{hash}/{timestamp}` where the `customer_id` and `timestamp` parameters are processed through the decrypt function in `app/Helper.php` without proper validation. The code decrypts using Laravel's built-in encryption functions, which subsequently deserialize the decrypted payload without sanitization, allowing attackers to craft malicious serialized PHP objects using classes to trigger arbitrary command execution. This is fixed in version 1.8.186.

03 Sep 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-03 02:15

Updated : 2025-09-08 15:03


NVD link : CVE-2025-58163

Mitre link : CVE-2025-58163

CVE.ORG link : CVE-2025-58163


JSON object : View

Products Affected

freescout

  • freescout
CWE
CWE-502

Deserialization of Untrusted Data