FreeScout, Insecure Direct Object Reference (IDOR), CVE-2025-48477 (Critical)

Listen to this Post

How CVE-2025-48477 Works

CVE-2025-48477 is an Insecure Direct Object Reference (IDOR) vulnerability in FreeScout before version 1.8.180. The flaw occurs due to improper sequence validation in the application logic, allowing attackers to bypass required steps when modifying Mailbox object attributes. The `fill()` method in the application fails to enforce proper access controls, enabling unauthorized changes to mailbox configurations. Attackers can exploit this by sending crafted requests that manipulate mailbox properties without completing the intended workflow. This could lead to unauthorized data access, privilege escalation, or service disruption. The vulnerability is critical as it allows attackers to modify core help desk functionalities without authentication.

DailyCVE Form

Platform: FreeScout
Version: <1.8.180
Vulnerability: IDOR
Severity: Critical
Date: 06/04/2025

Prediction: Patch expected by 06/15/2025

What Undercode Say:

Exploitation Commands:

curl -X POST "http://target/api/mailbox/update" -d '{"id":1,"attr":"malicious_value"}'
import requests
payload = {"mailbox_id": "1", "settings": {"admin_access": "true"}}
requests.patch("http://target/mailbox/update", json=payload)

Protection & Mitigation:

1. Immediate Workaround:

location /mailbox/ {
deny all;
}

2. Patch Verification:

grep -r "fill(" /var/www/freescout/app/

3. Log Monitoring:

tail -f /var/log/freescout/access.log | grep "POST /mailbox"

Detection Script:

import requests
def check_vulnerability(url):
test_payload = {"id": "1", "name": "test_exploit"}
r = requests.post(f"{url}/mailbox/update", json=test_payload)
return "Unauthorized modification" in r.text

Analytics:

  • Attack Vector: HTTP requests bypassing sequence checks
  • Privilege Impact: Elevation to admin
  • Exploitability: Low complexity, no auth required
  • Affected Endpoints: /mailbox/update, `/api/mailbox`
    – Signature Detection: Unusual `PATCH/POST` on mailbox objects

Permanent Fix:

Upgrade to FreeScout 1.8.180 via:

composer update freescout/freescout --with-dependencies

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top