Description
FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.217, a user holding the PERM_EDIT_USERS permission (intended for general user-profile editing) can read and modify the notification subscriptions of any other user, including admins, by sending a single POST request. This is a sibling of CVE-2025-48472's notification authorization bypass — the prior fix did not cover this code path. A non-admin attacker can silently disable an admin's email/browser/mobile notifications, suppressing security alerts and conversation-assignment notices. This issue has been patched in version 1.8.217.
Published: 2026-05-07
Score: 5.4 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in FreeScout allows a user with the PERM_EDIT_USERS permission to craft a single POST request that changes any other user's notification subscriptions, including those of administrators. This bypass of authorization control can cause admins to miss security alerts and assignment notifications, potentially delaying response to incidents. The weakness is classified as CWE‑863, an Authorization Bypass for User Data. No compromise of executables or data theft results directly, but the impact is a reduction of an admin’s situational awareness.

Affected Systems

The issue affects installations of the FreeScout help‑desk software before version 1.8.217 from the vendor freescout-help-desk. The affected product is the entire FreeScout application, which may be running on a variety of PHP/Laravel environments. The vendor released a patch in the 1.8.217 release, which addresses the bug.

Risk and Exploitability

The CVSS score is 5.4, indicating moderate severity. No EPSS score is available, so the probability of exploitation cannot be quantified from public metrics. The vulnerability is not listed in CISA's KEV catalog, suggesting that no widespread exploitation has been reported yet. Attackers would first need to possess the PERM_EDIT_USERS permission, which should be restricted to trusted users; the attack vector is a crafted HTTP POST request, thus accessible to any authenticated user who has that permission. If a non‑admin account is granted this permission, they can silently disable an admin’s notifications, enabling a stealthy bypass of alerts.

Generated by OpenCVE AI on May 7, 2026 at 20:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update FreeScout to version 1.8.217 or later to apply the vendor patch
  • Re‑evaluate account permissions and remove the PERM_EDIT_USERS privilege from non‑admin users
  • Implement monitoring or alerts for unauthorized changes to notification settings to detect possible exploitation

Generated by OpenCVE AI on May 7, 2026 at 20:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Freescout Helpdesk
Freescout Helpdesk freescout
Vendors & Products Freescout Helpdesk
Freescout Helpdesk freescout

Thu, 07 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.217, a user holding the PERM_EDIT_USERS permission (intended for general user-profile editing) can read and modify the notification subscriptions of any other user, including admins, by sending a single POST request. This is a sibling of CVE-2025-48472's notification authorization bypass — the prior fix did not cover this code path. A non-admin attacker can silently disable an admin's email/browser/mobile notifications, suppressing security alerts and conversation-assignment notices. This issue has been patched in version 1.8.217.
Title FreeScout IDOR Vulnerability: PERM_EDIT_USERS allows modifying any user's notification subscriptions (incomplete fix of CVE-2025-48472)
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Subscriptions

Freescout Helpdesk Freescout
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-07T18:02:01.058Z

Reserved: 2026-04-22T15:11:54.672Z

Link: CVE-2026-41903

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-07T19:16:00.950

Modified: 2026-05-07T19:51:36.220

Link: CVE-2026-41903

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T20:30:15Z

Weaknesses