Plattform
laravel
Komponente
laravel
Behoben in
1.8.210
1.8.210
CVE-2026-32754 describes a critical Stored Cross-Site Scripting (XSS) vulnerability affecting FreeScout, a free help desk and shared inbox built with the Laravel framework. This vulnerability allows an unauthenticated attacker to inject malicious HTML into email notifications, potentially leading to account compromise and data theft. Versions 1.8.208 and earlier are vulnerable, while version 1.8.209 addresses the issue.
The vulnerability lies in FreeScout's email notification templates. Incoming email bodies are stored in the database without proper sanitization. When these email bodies are later rendered in outgoing notifications, the application uses Blade's raw output syntax ({!! $thread->body !!}), which bypasses any HTML escaping. This means an attacker can inject arbitrary HTML and JavaScript code into the email body. An attacker only needs to send a specially crafted email to trigger the vulnerability. When an agent or administrator opens the email, the malicious script will execute in their browser context, potentially stealing cookies, redirecting them to phishing sites, or performing actions on their behalf. The blast radius extends to all users who receive notifications containing the injected content.
CVE-2026-32754 was publicly disclosed on 2026-03-19. No public proof-of-concept (POC) code has been released at the time of writing, but the vulnerability's simplicity suggests that a POC is likely to emerge. The EPSS score is likely to be medium to high due to the ease of exploitation and the potential impact. It is not currently listed on CISA KEV.
Organizations using FreeScout as a help desk or shared inbox solution are at risk, particularly those running versions 1.8.208 or earlier. Shared hosting environments where FreeScout is installed are especially vulnerable, as a compromise of one tenant could potentially impact others. Any organization handling sensitive customer data through FreeScout should prioritize patching.
• linux / server:
journalctl -u freescout | grep -i "html injection"• generic web:
curl -I https://your-freescout-instance.com/emails/ | grep -i "content-type: text/html"• wordpress / composer / npm: (Not applicable as FreeScout is not a WordPress plugin) • database (mysql, redis, mongodb, postgresql): (Not applicable, vulnerability is in the application layer) • windows / supply-chain: (Not applicable, FreeScout is typically deployed on Linux servers)
disclosure
Exploit-Status
EPSS
0.06% (20% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation is to immediately upgrade FreeScout to version 1.8.209 or later, which includes a fix for this vulnerability. If upgrading is not immediately feasible, a temporary workaround involves sanitizing all incoming email bodies before they are stored in the database. This can be achieved using Laravel's built-in sanitization functions or a third-party HTML purifier library. Additionally, consider implementing a Web Application Firewall (WAF) rule to block requests containing suspicious HTML tags or JavaScript code in email bodies. Regularly review and audit email notification templates to ensure proper escaping is implemented.
Aktualisieren Sie FreeScout auf Version 1.8.209 oder höher. Diese Version behebt die Stored Cross-Site Scripting (XSS)-Schwachstelle, indem der E-Mail-Inhalt in den Benachrichtigungs-Vorlagen korrekt escaped wird. Das Update verhindert die Ausführung von bösartigem JavaScript-Code in den E-Mail-Clients von Agenten und Administratoren.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-32754 is a critical Stored Cross-Site Scripting (XSS) vulnerability in FreeScout versions 1.8.208 and earlier. It allows attackers to inject malicious HTML into email notifications.
Yes, if you are using FreeScout versions 1.8.208 or earlier, you are vulnerable to this XSS attack.
Upgrade FreeScout to version 1.8.209 or later to resolve the vulnerability. Consider WAF rules as a temporary mitigation.
No active exploitation campaigns have been reported, but the vulnerability's ease of exploitation suggests it may be targeted soon.
Refer to the FreeScout security advisory on their official website or GitHub repository for detailed information and updates.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine composer.lock-Datei hoch und wir sagen dir sofort, ob du betroffen bist.