We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-48483

FreeScout Stored XSS leads to CSRF



Description

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and sanitization of user-input data during mail signature sanitization. An attacker can inject arbitrary HTML code, including JavaScript scripts, into the page processed by the user's browser, allowing them to steal sensitive data, hijack user sessions, or conduct other malicious activities. Additionally, if an administrator accesses one of these emails with a modified signature, it could result in a subsequent Cross-Site Request Forgery (CSRF) vulnerability. This issue has been patched in version 1.8.180.

Reserved 2025-05-22 | Published 2025-05-30 | Updated 2025-05-30 | Assigner GitHub_M


MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:L

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-352: Cross-Site Request Forgery (CSRF)

Product status

< 1.8.180
affected

References

github.com/...escout/security/advisories/GHSA-g2vq-qwx2-pc2m

cve.org (CVE-2025-48483)

nvd.nist.gov (CVE-2025-48483)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-48483

Support options

Helpdesk Chat, Email, Knowledgebase