Vulnerability Description
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and sanitization of user-input data during mail signature sanitization. An attacker can inject arbitrary HTML code, including JavaScript scripts, into the page processed by the user's browser, allowing them to steal sensitive data, hijack user sessions, or conduct other malicious activities. Additionally, if an administrator accesses one of these emails with a modified signature, it could result in a subsequent Cross-Site Request Forgery (CSRF) vulnerability. This issue has been patched in version 1.8.180.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freescout | Freescout | < 1.8.180 |
Related Weaknesses (CWE)
References
- https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-g2vq-qExploitVendor Advisory
FAQ
What is CVE-2025-48483?
CVE-2025-48483 is a vulnerability with a CVSS score of 5.4 (MEDIUM). FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and saniti...
How severe is CVE-2025-48483?
CVE-2025-48483 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-48483?
Check the references section above for vendor advisories and patch information. Affected products include: Freescout Freescout.