FreeScout, Mass Assignment Vulnerability, CVE-2025-48478 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-48478 is a mass assignment vulnerability in FreeScout (before v1.8.180) due to improper input validation in user creation. The `$fillable` array in the User object defines fields that can be bulk-assigned during registration. Attackers exploit this by injecting malicious payloads into unprotected fields, manipulating unintended attributes (e.g., admin privileges, API keys). The lack of server-side whitelisting allows overwriting sensitive parameters, escalating privileges, or compromising data integrity. The flaw stems from Laravel’s mass-assignment feature misconfiguration, where developer-defined safeguards (e.g., $fillable/$guarded) are bypassed via crafted HTTP requests.

DailyCVE Form

Platform: FreeScout
Version: <1.8.180
Vulnerability: Mass Assignment
Severity: Critical
Date: 06/04/2025

Prediction: Patch expected by 06/15/2025

What Undercode Say:

Exploitation:

1. Craft Malicious Request:

POST /users/create HTTP/1.1
Host: target.com
{"name":"attacker","email":"[email protected]","is_admin":1}

2. Bypass Validation:

// Attacker manipulates $fillable fields (e.g., 'is_admin') via JSON/Form-Data.

Protection:

1. Patch Upgrade:

composer update freescout/freescout --with-dependencies

2. Input Whitelisting:

protected $fillable = ['name', 'email']; // Explicitly define allowed fields.

3. Middleware Sanitization:

public function createUser(Request $request) {
$validated = $request->only(['name', 'email']);
User::create($validated);
}

Detection:

1. Log Analysis:

grep -r "\$fillable" /var/www/freescout/app/Models/

2. Vulnerability Scan:

nmap -p 80,443 --script http-vuln-cve2025-48478 target.com

Mitigation:

  • Temporary Fix: Disable user registration via .env:
    ALLOW_SIGNUP=false
    
  • WAF Rule: Block suspicious mass-assignment patterns:
    if ($request_body ~ "is_admin|role_id") { return 403; }
    

Post-Exploit Forensics:

journalctl -u freescout --since "2025-06-01" | grep "user_created"

No further commentary.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top