Impact
FreeScout is a free, self‑hosted help desk that allows administrators to install modules via uploaded ZIP archives. Before version 1.8.215 the extraction process does not validate the file paths inside the ZIP, which permits a maliciously crafted archive to write files to arbitrary locations on the server. An authenticated administrator who can install modules might therefore upload and place any file, including executable scripts, resulting in remote code execution.
Affected Systems
The vulnerability affects the FreeScout help desk platform (freescout-help-desk:freescout). All releases prior to 1.8.215 are impacted, while updating to version 1.8.215 or newer removes the flaw.
Risk and Exploitability
The CVSS score of 9.1 indicates high severity. The EPSS score is not currently available and the flaw is not listed in the CISA KEV catalog, but the risk remains significant due to the serious impact. Exploitation requires an authenticated administrator with module upload privileges; an attacker who obtains or compromises such credentials can create arbitrary files on the server, leading to remote code execution. The high CVSS and the potential to run arbitrary code make this a serious threat for any deployment hosting FreeScout.
OpenCVE Enrichment