<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Freescout — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/freescout/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/freescout/feed.xml" rel="self" type="application/rss+xml"/><item><title>FreeScout Privilege Escalation via Email Address Reassignment (CVE-2026-40589)</title><link>https://feed.craftedsignal.io/briefs/2026-04-freescout-privesc/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-freescout-privesc/</guid><description>FreeScout versions before 1.8.214 are vulnerable to privilege escalation, allowing a low-privileged agent to reassign email addresses from hidden customers to visible customers, leading to information disclosure and unauthorized access to conversations.</description><content:encoded><![CDATA[<p>FreeScout is a self-hosted help desk and shared mailbox system. A critical vulnerability, identified as CVE-2026-40589, exists in versions prior to 1.8.214. This flaw allows a low-privileged agent to escalate their privileges by manipulating customer records. Specifically, an agent can edit a visible customer&rsquo;s profile and add an email address that is already associated with a hidden customer in a different mailbox. This results in the disclosure of the hidden customer&rsquo;s name and profile URL within the application&rsquo;s success flash message. Additionally, the vulnerable server reassigns the hidden customer&rsquo;s email address to the visible customer and rebinds all conversations from the hidden mailbox associated with that email address to the visible customer. The vulnerability was patched in version 1.8.214. This poses a significant risk to organizations using affected versions of FreeScout, as it can lead to unauthorized access to sensitive customer data and communication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A low-privileged agent logs into the FreeScout instance.</li>
<li>The agent selects a visible customer within their accessible mailbox.</li>
<li>The agent attempts to edit the visible customer&rsquo;s profile.</li>
<li>The agent adds an email address to the visible customer&rsquo;s profile that is already associated with a hidden customer in another mailbox, which the agent would normally not have access to.</li>
<li>The server validates the request and, due to the vulnerability, allows the reassignment of the email address.</li>
<li>The server discloses the hidden customer&rsquo;s name and profile URL in the success flash message displayed to the agent.</li>
<li>The server reassigns the hidden customer&rsquo;s email address to the visible customer in the database.</li>
<li>All conversations previously associated with the hidden customer&rsquo;s email address are now accessible to the agent through the visible customer&rsquo;s profile, leading to unauthorized access of customer conversations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40589 can lead to a significant breach of confidentiality and integrity within a FreeScout instance. A low-privileged agent can gain unauthorized access to sensitive customer data, including names, profile URLs, and entire conversation histories. This can result in the compromise of customer privacy, potential regulatory violations, and damage to the organization&rsquo;s reputation. The number of potential victims is directly proportional to the number of customers and mailboxes within the affected FreeScout instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FreeScout instances to version 1.8.214 or later to remediate CVE-2026-40589 as mentioned in the overview.</li>
<li>Deploy the Sigma rule &ldquo;FreeScout Hidden Customer Data Disclosure&rdquo; to detect attempts to exploit this vulnerability in web server logs.</li>
<li>Monitor FreeScout application logs for unusual activity related to customer profile modifications.</li>
<li>Implement strict access control policies within FreeScout to minimize the potential impact of compromised agent accounts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>cve-2026-40589</category><category>freescout</category></item><item><title>FreeScout Mass Assignment Vulnerability (CVE-2026-40569)</title><link>https://feed.craftedsignal.io/briefs/2026-04-freescout-mass-assignment/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-freescout-mass-assignment/</guid><description>FreeScout versions prior to 1.8.213 contain a mass assignment vulnerability allowing authenticated admins to modify sensitive mailbox settings by injecting parameters into connection settings requests, leading to email exfiltration and account compromise.</description><content:encoded><![CDATA[<p>FreeScout, a self-hosted help desk and shared mailbox platform, is vulnerable to a mass assignment flaw (CVE-2026-40569) in versions prior to 1.8.213. The vulnerability resides in the <code>connectionIncomingSave()</code> and <code>connectionOutgoingSave()</code> methods within <code>app/Http/Controllers/MailboxesController.php</code>.  These methods lack proper input validation, allowing an authenticated administrator to overwrite critical mailbox settings by injecting arbitrary parameters into legitimate connection setting update requests. Attackers can modify fields like <code>auto_bcc</code>, <code>out_server</code>, <code>out_password</code>, <code>signature</code>, <code>auto_reply_enabled</code>, and <code>auto_reply_message</code>. This issue allows malicious actors to silently surveil communications, redirect SMTP traffic, inject malicious content, and persistently compromise email accounts. The impact is particularly severe in multi-admin environments or when an admin session is compromised through other means (e.g., XSS). FreeScout version 1.8.213 addresses this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to the FreeScout admin panel, either through legitimate credentials or by exploiting another vulnerability (e.g., XSS).</li>
<li>The attacker navigates to the mailbox connection settings page.</li>
<li>The attacker crafts a legitimate request to update connection settings, such as IMAP or SMTP server details.</li>
<li>The attacker injects malicious parameters into the request, such as <code>auto_bcc=attacker@evil.com</code>, which are not directly exposed in the connection settings form.</li>
<li>The FreeScout application, due to the mass assignment vulnerability in <code>connectionIncomingSave()</code> or <code>connectionOutgoingSave()</code>, processes the injected parameters and updates the corresponding mailbox settings in the database.</li>
<li>When <code>auto_bcc</code> is set, every outgoing email from the compromised mailbox is silently BCC&rsquo;d to the attacker-controlled email address via the <code>SendReplyToCustomer</code> job.</li>
<li>Alternatively, the attacker could modify the <code>out_server</code> and <code>out_password</code> fields to redirect outgoing SMTP traffic through an attacker-controlled server.</li>
<li>The attacker gains persistent access to all outgoing email from the affected mailbox, enabling data exfiltration or further malicious activities like phishing.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of FreeScout mailboxes. An attacker could silently exfiltrate sensitive email communications, potentially impacting hundreds or thousands of users depending on the size of the organization. The injected parameters persist even after the initial attack, providing long-term access. This is especially dangerous in organizations that handle sensitive customer data or financial information. The ability to redirect SMTP traffic and inject malicious content further amplifies the risk, potentially leading to widespread phishing campaigns and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FreeScout to version 1.8.213 or later to patch CVE-2026-40569 immediately.</li>
<li>Implement strict input validation and sanitization for all user-supplied data, particularly in the <code>connectionIncomingSave()</code> and <code>connectionOutgoingSave()</code> methods, to prevent mass assignment vulnerabilities.</li>
<li>Review existing FreeScout installations for any unauthorized modifications to mailbox settings, specifically focusing on <code>auto_bcc</code>, <code>out_server</code>, <code>out_password</code>, <code>signature</code>, <code>auto_reply_enabled</code>, and <code>auto_reply_message</code> fields (requires direct database inspection).</li>
<li>Monitor FreeScout webserver logs for POST requests to <code>/mailboxes/*/connection/incoming-save</code> and <code>/mailboxes/*/connection/outgoing-save</code> endpoints containing unexpected parameters to detect potential exploitation attempts (see example Sigma rule below).</li>
<li>Enable webserver logging and ensure that POST request bodies are captured to facilitate investigation and detection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>freescout</category><category>mass-assignment</category><category>vulnerability</category><category>email-exfiltration</category></item><item><title>FreeScout Incorrect Authorization Vulnerability (CVE-2026-41189)</title><link>https://feed.craftedsignal.io/briefs/2026-04-freescout-authz-bypass/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-freescout-authz-bypass/</guid><description>FreeScout versions before 1.8.215 are vulnerable to an incorrect authorization issue where users without conversation access can edit customer threads due to a flaw in the `ThreadPolicy::edit()` function.</description><content:encoded><![CDATA[<p>FreeScout, a self-hosted help desk and shared mailbox platform, is affected by an authorization bypass vulnerability. Specifically, versions prior to 1.8.215 fail to properly restrict access to customer threads within conversations. The vulnerability resides in the <code>ThreadPolicy::edit()</code> function, which checks mailbox access but neglects to enforce the <code>ConversationPolicy</code>&rsquo;s assigned-only restriction.  This allows a user who should not have access to a conversation to still load and modify customer-authored threads contained within that conversation. Upgrading to version 1.8.215 resolves this vulnerability. This allows unauthorized modification of customer communications, potentially leading to data breaches or manipulated customer service interactions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to a FreeScout user account with limited privileges.</li>
<li>Attacker attempts to access a conversation thread for which they lack explicit authorization.</li>
<li>The application&rsquo;s <code>ThreadPolicy::edit()</code> function is invoked to authorize the edit action.</li>
<li>The <code>ThreadPolicy::edit()</code> function incorrectly authorizes the action by only checking mailbox access, bypassing the <code>ConversationPolicy</code>&rsquo;s assigned-only restriction.</li>
<li>The attacker successfully loads the customer-authored thread, gaining unauthorized access.</li>
<li>Attacker modifies the content of the customer-authored thread.</li>
<li>The modified thread is saved, altering the conversation history.</li>
<li>The change impacts communications with the customer.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability (CVE-2026-41189) allows unauthorized users to modify customer communications within the FreeScout help desk platform.  Successful exploitation can lead to data integrity issues, potentially impacting all customer conversations within the affected FreeScout instance. The severity is heightened by the potential for attackers to manipulate sensitive information, leading to reputational damage, legal ramifications, and loss of customer trust.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FreeScout to version 1.8.215 or later to patch CVE-2026-41189.</li>
<li>Monitor FreeScout web server logs for unauthorized access attempts using the provided Sigma rule.</li>
<li>Review user access controls and ensure that the principle of least privilege is enforced to limit the impact of potential compromises.</li>
<li>Implement the provided Sigma rule to detect potential unauthorized thread editing attempts based on HTTP request patterns.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>freescout</category><category>authorization</category><category>vulnerability</category></item><item><title>FreeScout CSS Injection Vulnerability in Mailbox Signature Leads to Privilege Escalation (CVE-2026-40497)</title><link>https://feed.craftedsignal.io/briefs/2026-04-freescout-css-injection/</link><pubDate>Tue, 21 Apr 2026 03:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-freescout-css-injection/</guid><description>FreeScout versions prior to 1.8.213 are vulnerable to CSS injection via the mailbox signature, allowing an attacker with mailbox settings access to exfiltrate CSRF tokens and escalate privileges.</description><content:encoded><![CDATA[<p>FreeScout, a self-hosted help desk and shared mailbox platform, is susceptible to a CSS injection vulnerability (CVE-2026-40497) in versions prior to 1.8.213. The vulnerability resides within the <code>Helper::stripDangerousTags()</code> function, which inadequately sanitizes the mailbox signature field. While the function removes <code>&lt;script&gt;</code>, <code>&lt;form&gt;</code>, <code>&lt;iframe&gt;</code>, and <code>&lt;object&gt;</code> tags, it fails to strip <code>&lt;style&gt;</code> tags. An attacker with access to mailbox settings, either an administrator or an agent with sufficient permissions, can inject malicious CSS code into the signature field via POST requests to <code>/mailbox/settings/{id}</code>. This injected CSS is then rendered unescaped in conversation views using <code>{!! $conversation-&gt;getSignatureProcessed([], true) !!}</code>. The application&rsquo;s CSP, which allows <code>style-src * 'self' 'unsafe-inline'</code>, enables the execution of injected inline styles. This vulnerability allows attackers to exfiltrate CSRF tokens and ultimately escalate privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to FreeScout with agent or admin privileges and permission to modify mailbox settings.</li>
<li>Attacker navigates to the mailbox settings page.</li>
<li>Attacker injects malicious CSS code, including CSS attribute selectors designed to exfiltrate CSRF tokens, into the mailbox signature field via a POST request to <code>/mailbox/settings/{id}</code>.  The injected CSS leverages <code>style-src * 'self' 'unsafe-inline'</code> in the Content Security Policy.</li>
<li>The FreeScout server saves the malicious signature to the database.</li>
<li>A victim (another agent or admin) views a conversation within the affected mailbox, causing the malicious signature to be rendered via <code>{!! $conversation-&gt;getSignatureProcessed([], true) !!}</code>.</li>
<li>The injected CSS executes in the victim&rsquo;s browser and exfiltrates the CSRF token, potentially via a DNS request or HTTP request to an attacker-controlled server (not detailed in source).</li>
<li>The attacker uses the stolen CSRF token to perform unauthorized actions on behalf of the victim.</li>
<li>The attacker escalates privileges by creating new admin accounts or modifying existing user credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to escalate privileges from an agent to an administrator within the FreeScout platform. This could lead to a complete compromise of the help desk system. An attacker could create new administrator accounts, modify existing user credentials, access sensitive customer data, and potentially disrupt the entire help desk operation. While the exact number of potentially affected FreeScout instances is unknown, all installations prior to version 1.8.213 are vulnerable if an attacker gains valid access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FreeScout to version 1.8.213 or later to apply the updated fix for CVE-2026-40497.</li>
<li>Implement the Sigma rule &ldquo;FreeScout Suspicious Mailbox Signature Update&rdquo; to detect attempts to inject CSS into the mailbox signature field.</li>
<li>Monitor web server logs for POST requests to <code>/mailbox/settings/{id}</code> and inspect the request body for <code>&lt;style&gt;</code> tags or suspicious CSS syntax to potentially detect attempted exploitation (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>freescout</category><category>css-injection</category><category>privilege-escalation</category><category>cve-2026-40497</category></item><item><title>Critical Vulnerabilities in FreeScout Help Desk Allow Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-02-freescout-rce/</link><pubDate>Wed, 25 Feb 2026 14:05:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-freescout-rce/</guid><description>Critical vulnerabilities, CVE-2026-27636 and CVE-2026-27637, exist in FreeScout Help Desk that could be exploited to achieve remote code execution, potentially leading to data exfiltration and system compromise.</description><content:encoded>&lt;p>FreeScout, a popular open-source help desk solution, is affected by two critical vulnerabilities, CVE-2026-27636 and CVE-2026-27637. Disclosed in February 2026, these vulnerabilities can be exploited independently or chained to achieve remote code execution. CVE-2026-27636 stems from insufficient file upload restrictions, while CVE-2026-27637 relates to predictable authentication tokens. Successful exploitation allows attackers to execute arbitrary system commands, read/write files, pivot to…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>freescout</category><category>rce</category><category>vulnerability</category><category>apache</category></item></channel></rss>