FreeScout Incorrect Authorization Vulnerability (CVE-2026-41189)
FreeScout versions before 1.8.215 are vulnerable to an incorrect authorization issue where users without conversation access can edit customer threads due to a flaw in the `ThreadPolicy::edit()` function.
FreeScout, a self-hosted help desk and shared mailbox platform, is affected by an authorization bypass vulnerability. Specifically, versions prior to 1.8.215 fail to properly restrict access to customer threads within conversations. The vulnerability resides in the ThreadPolicy::edit() function, which checks mailbox access but neglects to enforce the ConversationPolicy’s assigned-only restriction. This allows a user who should not have access to a conversation to still load and modify customer-authored threads contained within that conversation. Upgrading to version 1.8.215 resolves this vulnerability. This allows unauthorized modification of customer communications, potentially leading to data breaches or manipulated customer service interactions.
Attack Chain
- Attacker gains access to a FreeScout user account with limited privileges.
- Attacker attempts to access a conversation thread for which they lack explicit authorization.
- The application’s
ThreadPolicy::edit()function is invoked to authorize the edit action. - The
ThreadPolicy::edit()function incorrectly authorizes the action by only checking mailbox access, bypassing theConversationPolicy’s assigned-only restriction. - The attacker successfully loads the customer-authored thread, gaining unauthorized access.
- Attacker modifies the content of the customer-authored thread.
- The modified thread is saved, altering the conversation history.
- The change impacts communications with the customer.
Impact
This vulnerability (CVE-2026-41189) allows unauthorized users to modify customer communications within the FreeScout help desk platform. Successful exploitation can lead to data integrity issues, potentially impacting all customer conversations within the affected FreeScout instance. The severity is heightened by the potential for attackers to manipulate sensitive information, leading to reputational damage, legal ramifications, and loss of customer trust.
Recommendation
- Upgrade FreeScout to version 1.8.215 or later to patch CVE-2026-41189.
- Monitor FreeScout web server logs for unauthorized access attempts using the provided Sigma rule.
- Review user access controls and ensure that the principle of least privilege is enforced to limit the impact of potential compromises.
- Implement the provided Sigma rule to detect potential unauthorized thread editing attempts based on HTTP request patterns.
Detection coverage 2
FreeScout Unauthorized Thread Edit Attempt
mediumDetects attempts to edit customer threads in FreeScout by users without proper authorization based on HTTP POST requests to specific endpoints.
FreeScout Thread Policy Edit Function Access
lowDetects access to the ThreadPolicy edit function, potentially indicating an attempt to exploit CVE-2026-41189. Requires application-level logging.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
3
url
| Type | Value |
|---|---|
| [email protected] | |
| url | https://github.com/freescout-help-desk/freescout/commit/cdadaf621bb1e1d017315df20d743671f7eae7a9 |
| url | https://github.com/freescout-help-desk/freescout/releases/tag/1.8.215 |
| url | https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-4h5p-7f5c-q7gj |