CVE-2026-27637: Php
CVE-2026-27637
FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.206, FreeScout's `TokenAuth` middleware uses a predictable authentication token computed as `MD5...
Overview
A critical authentication bypass vulnerability has been identified in FreeScout, a popular open-source help desk application. This flaw allows an attacker to forge valid login tokens for any user, including administrators, leading to a complete system compromise.
Vulnerability Details
In affected versions, FreeScout uses a predictable and static method for generating user authentication tokens. The token is created by calculating an MD5 hash of a simple combination: the user’s ID, their account creation timestamp, and the application’s secret APP_KEY.
The core issues are:
- Predictable Generation: The formula is simple and deterministic.
- No Expiry or Rotation: Once created, a token is valid forever.
- Single Point of Failure: If the
APP_KEYis exposed, all user tokens can be forged.
Since the APP_KEY is a common exposure vector in Laravel applications (often leaked in public repositories or misconfigured environments), an attacker who obtains it can easily calculate a working login token for any user account without needing a password.
Impact
The impact of this vulnerability is severe (CVSS Score: 9.8 - CRITICAL). A successful exploit results in:
- Full Account Takeover: Attackers can log in as any user, including administrators with full system control.
- Data Breach: Unauthorized access to all help desk tickets, customer communications, and sensitive internal data.
- Further System Compromise: Administrative access can be used to deploy malware, create backdoors, or attack connected systems. This vulnerability may also be chained with other flaws (like CVE-2026-27636) for increased effect.
Remediation and Mitigation
Immediate action is required to secure affected installations.
Primary Fix:
- Upgrade Immediately: All users must upgrade to FreeScout version 1.8.206 or later, which contains the security patch for this vulnerability. This update addresses the flawed token generation mechanism.
Immediate Mitigation Steps (If Upgrade is Delayed):
- Audit for
APP_KEYExposure: Immediately check for any accidental public exposure of your.envfile orAPP_KEYin code repositories, backups, or server logs. - Rotate the
APP_KEY: If any exposure is suspected, generate a newAPP_KEY. Warning: This will invalidate all existing user sessions and some encrypted data; ensure you follow the official Laravel and FreeScout procedures for key rotation. - Monitor for Suspicious Activity: Review application and server logs for any unauthorized login attempts or access from unfamiliar locations.
General Best Practice:
- Never commit
.envfiles or any files containing secrets to version control. - Restrict access to application configuration files and directories on your server.
- Maintain a regular schedule for applying security updates to all software components.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Prior to 1.0.477, 1.1.12, and 1.2.12, Winter CMS allowed authenticated backend users to escalate their...
FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with f...
FileThingie 2.5.7 contains an arbitrary file upload vulnerability that allows attackers to upload malicious files by sending ZIP archives through the ft2.php endpoint. Attackers can upload ZIP files c...
WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, a critical SQL injection vulnerability exists in the WeGIA application. The remover_produto_ocultar.php script uses extract(...
Other PHP Vulnerabilities
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kateg...
Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'kat' parameter....
Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting ...
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid paramet...