CVE-2025-48388

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.178, the application performs insufficient validation of user-supplied data, which is used as arguments to string formatting functions. As a result, an attacker can pass a string containing special symbols (\r, \n, \t)to the application. This issue has been patched in version 1.8.178.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*

History

11 Jul 2025, 15:22

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*
First Time Freescout
Freescout freescout
References () https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-c76f-wggm-grcq - () https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-c76f-wggm-grcq - Vendor Advisory
References () https://github.com/freescout-help-desk/freescout/commit/eab97711027fff4bce90ccd2e189cbc184fa0370 - () https://github.com/freescout-help-desk/freescout/commit/eab97711027fff4bce90ccd2e189cbc184fa0370 - Patch

29 May 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-29 10:15

Updated : 2025-07-11 15:22


NVD link : CVE-2025-48388

Mitre link : CVE-2025-48388


JSON object : View

Products Affected

freescout

  • freescout
CWE
CWE-134

Use of Externally-Controlled Format String

CWE-93

Improper Neutralization of CRLF Sequences ('CRLF Injection')