CVE-2025-58163

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Versions 1.8.185 and earlier contain a deserialization of untrusted data vulnerability that allows authenticated attackers with knowledge of the application's APP_KEY to achieve remote code execution. The vulnerability is exploited via endpoint, e.g.: `/help/{mailbox_id}/auth/{customer_id}/{hash}/{timestamp}` where the `customer_id` and `timestamp` parameters are processed through the decrypt function in `app/Helper.php` without proper validation. The code decrypts using Laravel's built-in encryption functions, which subsequently deserialize the decrypted payload without sanitization, allowing attackers to craft malicious serialized PHP objects using classes to trigger arbitrary command execution. This is fixed in version 1.8.186.
CVSS

No CVSS.

Configurations

No configuration.

History

03 Sep 2025, 03:15

Type Values Removed Values Added
Summary (en) FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. In versions 1.8.185 and below, the application performs deserialization of data that can allow authenticated attackers with knowledge of the application's APP_KEY to achieve remote code execution. The vulnerability can be exploited via endpoint: `/help/{mailbox_id}/auth/{customer_id}/{hash}/{timestamp}` where the `customer_id` and `timestamp` parameters are processed through the decrypt function in `app/Helper.php` without proper validation. The vulnerable code performs decryption using Laravel's built-in encryption functions, which subsequently deserializes the decrypted payload without sanitization. This is fixed in version 1.8.186. (en) FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Versions 1.8.185 and earlier contain a deserialization of untrusted data vulnerability that allows authenticated attackers with knowledge of the application's APP_KEY to achieve remote code execution. The vulnerability is exploited via endpoint, e.g.: `/help/{mailbox_id}/auth/{customer_id}/{hash}/{timestamp}` where the `customer_id` and `timestamp` parameters are processed through the decrypt function in `app/Helper.php` without proper validation. The code decrypts using Laravel's built-in encryption functions, which subsequently deserialize the decrypted payload without sanitization, allowing attackers to craft malicious serialized PHP objects using classes to trigger arbitrary command execution. This is fixed in version 1.8.186.
References
  • {'url': 'https://github.com/freescout-help-desk/freescout/commit/1794763bbb17509af3183e667d695056545ef62a', 'source': 'security-advisories@github.com'}
  • () https://github.com/freescout-help-desk/freescout/commit/e2de65f3f32f825b4ec5558643ed81438c9a6bc6 -

03 Sep 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-03 02:15

Updated : 2025-09-04 15:36


NVD link : CVE-2025-58163

Mitre link : CVE-2025-58163

CVE.ORG link : CVE-2025-58163


JSON object : View

Products Affected

No product.

CWE
CWE-502

Deserialization of Untrusted Data