<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-40497 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-40497/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 21 Apr 2026 03:16:08 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-40497/feed.xml" rel="self" type="application/rss+xml"/><item><title>FreeScout CSS Injection Vulnerability in Mailbox Signature Leads to Privilege Escalation (CVE-2026-40497)</title><link>https://feed.craftedsignal.io/briefs/2026-04-freescout-css-injection/</link><pubDate>Tue, 21 Apr 2026 03:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-freescout-css-injection/</guid><description>FreeScout versions prior to 1.8.213 are vulnerable to CSS injection via the mailbox signature, allowing an attacker with mailbox settings access to exfiltrate CSRF tokens and escalate privileges.</description><content:encoded><![CDATA[<p>FreeScout, a self-hosted help desk and shared mailbox platform, is susceptible to a CSS injection vulnerability (CVE-2026-40497) in versions prior to 1.8.213. The vulnerability resides within the <code>Helper::stripDangerousTags()</code> function, which inadequately sanitizes the mailbox signature field. While the function removes <code>&lt;script&gt;</code>, <code>&lt;form&gt;</code>, <code>&lt;iframe&gt;</code>, and <code>&lt;object&gt;</code> tags, it fails to strip <code>&lt;style&gt;</code> tags. An attacker with access to mailbox settings, either an administrator or an agent with sufficient permissions, can inject malicious CSS code into the signature field via POST requests to <code>/mailbox/settings/{id}</code>. This injected CSS is then rendered unescaped in conversation views using <code>{!! $conversation-&gt;getSignatureProcessed([], true) !!}</code>. The application&rsquo;s CSP, which allows <code>style-src * 'self' 'unsafe-inline'</code>, enables the execution of injected inline styles. This vulnerability allows attackers to exfiltrate CSRF tokens and ultimately escalate privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to FreeScout with agent or admin privileges and permission to modify mailbox settings.</li>
<li>Attacker navigates to the mailbox settings page.</li>
<li>Attacker injects malicious CSS code, including CSS attribute selectors designed to exfiltrate CSRF tokens, into the mailbox signature field via a POST request to <code>/mailbox/settings/{id}</code>.  The injected CSS leverages <code>style-src * 'self' 'unsafe-inline'</code> in the Content Security Policy.</li>
<li>The FreeScout server saves the malicious signature to the database.</li>
<li>A victim (another agent or admin) views a conversation within the affected mailbox, causing the malicious signature to be rendered via <code>{!! $conversation-&gt;getSignatureProcessed([], true) !!}</code>.</li>
<li>The injected CSS executes in the victim&rsquo;s browser and exfiltrates the CSRF token, potentially via a DNS request or HTTP request to an attacker-controlled server (not detailed in source).</li>
<li>The attacker uses the stolen CSRF token to perform unauthorized actions on behalf of the victim.</li>
<li>The attacker escalates privileges by creating new admin accounts or modifying existing user credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to escalate privileges from an agent to an administrator within the FreeScout platform. This could lead to a complete compromise of the help desk system. An attacker could create new administrator accounts, modify existing user credentials, access sensitive customer data, and potentially disrupt the entire help desk operation. While the exact number of potentially affected FreeScout instances is unknown, all installations prior to version 1.8.213 are vulnerable if an attacker gains valid access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FreeScout to version 1.8.213 or later to apply the updated fix for CVE-2026-40497.</li>
<li>Implement the Sigma rule &ldquo;FreeScout Suspicious Mailbox Signature Update&rdquo; to detect attempts to inject CSS into the mailbox signature field.</li>
<li>Monitor web server logs for POST requests to <code>/mailbox/settings/{id}</code> and inspect the request body for <code>&lt;style&gt;</code> tags or suspicious CSS syntax to potentially detect attempted exploitation (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>freescout</category><category>css-injection</category><category>privilege-escalation</category><category>cve-2026-40497</category></item></channel></rss>