CVE-2025-54366
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-26

Last updated on: 2025-09-11

Assigner: GitHub, Inc.

Description
FreeScout is a lightweight free open source help desk and shared inbox built with PHP (Laravel framework). In versions 1.8.185 and below, there is a critical deserialization vulnerability in the /conversation/ajax endpoint that allows authenticated users with knowledge of the APP_KEY to achieve remote code execution. The vulnerability occurs when the application processes the attachments_all and attachments POST parameters through the insecure Helper::decrypt() function, which performs unsafe deserialization of user-controlled data without proper validation. This flaw enables attackers to create arbitrary objects and manipulate their properties, leading to complete compromise of the web application. This is fixed in version 1.8.186.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-26
Last Modified
2025-09-11
Generated
2026-05-07
AI Q&A
2025-07-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
freescout freescout to 1.8.86 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a critical deserialization flaw in FreeScout versions 1.8.185 and below. It occurs in the /conversation/ajax endpoint where the application insecurely deserializes user-controlled data from the POST parameters attachments_all and attachments using the Helper::decrypt() function. An authenticated user with knowledge of the APP_KEY can craft malicious serialized objects that, when deserialized, allow arbitrary object creation and property manipulation. This leads to remote code execution and complete compromise of the web application. [2]


How can this vulnerability impact me? :

This vulnerability can lead to remote code execution on the affected FreeScout web application, allowing an attacker with authorized user privileges and knowledge of the APP_KEY to execute arbitrary code. This results in a complete compromise of the application, impacting confidentiality, integrity, and availability of the system. Attackers can manipulate application logic and potentially gain full control over the server hosting the application. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can involve monitoring for suspicious POST requests to the /conversation/ajax endpoint containing the parameters attachments_all[] or attachments[] with serialized data. Since exploitation requires knowledge of the APP_KEY and authorized user access, detection may include inspecting web server logs or application logs for unusual or unexpected serialized payloads in these parameters. Specific commands could include using tools like curl or wget to simulate or capture such requests, or using grep to search logs for these parameters. For example, to search Apache logs for suspicious POST requests: grep 'POST /conversation/ajax' /var/log/apache2/access.log | grep 'attachments'. However, no exact detection commands are provided in the resources. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading FreeScout to version 1.8.186 or later, where the vulnerability is patched. Additionally, prevent the receipt of untrusted serialized data at the web server level, avoid using unsafe deserialization by replacing serialized objects with safer data formats like JSON or XML, explicitly define data types during deserialization, implement data integrity checks such as HMAC, use separate objects for deserialized data to enforce input validation, and mark sensitive fields as transient to avoid serialization. Restricting access to authorized users and protecting the APP_KEY are also critical to prevent exploitation. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart