CVE-2025-48471 – FreeScout Apache Remote Code Execution Vulnerability

The following table lists the changes that have been made to the
CVE-2025-48471 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    May. 29, 2025

    Action Type Old Value New Value
    Added Description FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.179, the application does not check or performs insufficient checking of files uploaded to the application. This allows files to be uploaded with the phtml and phar extensions, which can lead to remote code execution if the Apache web server is used. This issue has been patched in version 1.8.179.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-434
    Added Reference https://github.com/freescout-help-desk/freescout/commit/e136660e8dbc220454b8d3f646dd1b144e49e9ed
    Added Reference https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-h2f3-932h-v38j
  • CVE Modified
    by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    May. 29, 2025

    Action Type Old Value New Value
    Added Reference https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-h2f3-932h-v38j
Share the Post:

Related Posts