Critical (9.3)

PHP XSS (CVE-2026-32754)

CVE-2026-32754

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Versions 1.8.208 and below are vulnerable to Stored Cross-Site Scripting (XSS) through FreeScout's email notification...

Overview

A critical security vulnerability, identified as CVE-2026-32754, has been discovered in FreeScout, a popular open-source help desk and shared inbox application. This flaw is a Stored Cross-Site Scripting (XSS) vulnerability that allows an unauthenticated attacker to inject malicious code into the system, which is then automatically delivered to administrators and support agents.

Vulnerability Details

The vulnerability exists in how FreeScout processes incoming emails for notification templates. When an email is received, its body content is stored in the database without proper sanitization. This unsanitized content is then rendered directly into outgoing email notifications using a dangerous template syntax ({!! $thread->body !!}) that does not escape HTML characters.

Because the attack is “stored,” the malicious payload persists in the system. An attacker needs only to send a specially crafted email to a monitored help desk inbox. The payload is then triggered automatically when any subscribed agent or admin opens the subsequent notification email as part of their normal workflow.

Potential Impact

The impact of this vulnerability is severe and wide-ranging:

  • Universal HTML Injection: Attackers can forge phishing content or embed tracking pixels within legitimate-looking notification emails.
  • JavaScript Execution: In vulnerable email clients (like webmail interfaces), the attacker’s scripts can execute. This can lead to session hijacking, credential theft, and complete account takeover of administrator accounts.
  • Lateral Movement: Compromising an admin account can provide a foothold to attack internal networks or steal sensitive customer data from the help desk system. For context on how such breaches unfold, you can review historical incidents in our breach reports.

With a CVSS score of 9.3 (CRITICAL), this flaw represents a major threat to the security and integrity of any organization using an affected version of FreeScout.

Remediation and Mitigation

The primary and only complete solution is to update the software immediately.

  1. Immediate Patching: Upgrade FreeScout to version 1.8.209 or later without delay. This version contains the necessary fixes to properly sanitize email content before output.
  2. Version Check: Confirm you are running FreeScout version 1.8.208 or below. If so, you are vulnerable and must plan the upgrade.
  3. Temporary Caution: Until the patch is applied, advise agents and administrators to exercise extreme caution with email notifications. However, this is not a reliable mitigation, as the exploit blends into normal workflow.

Staying informed about such critical vulnerabilities is key to proactive defense. For the latest updates on threats and patches, follow our security news section. Do not delay in applying this update, as the exploit requires no authentication and is trivial to perform.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.