CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-48483: FreeScout Stored XSS leads to CSRF

5.4 CVSS

Description

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and sanitization of user-input data during mail signature sanitization. An attacker can inject arbitrary HTML code, including JavaScript scripts, into the page processed by the user's browser, allowing them to steal sensitive data, hijack user sessions, or conduct other malicious activities. Additionally, if an administrator accesses one of these emails with a modified signature, it could result in a subsequent Cross-Site Request Forgery (CSRF) vulnerability. This issue has been patched in version 1.8.180.

Classification

CVE ID: CVE-2025-48483

CVSS Base Severity: MEDIUM

CVSS Base Score: 5.4

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Problem Types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-352: Cross-Site Request Forgery (CSRF)

Affected Products

Vendor: freescout-help-desk

Product: freescout

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.02% (probability of being exploited)

EPSS Percentile: 2.1% (scored less or equal to compared to others)

EPSS Date: 2025-06-17 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-48483
https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-g2vq-qwx2-pc2m

Timeline