प्लेटफ़ॉर्म
php
घटक
freescout
में ठीक किया गया
1.8.216
CVE-2026-41190 affects FreeScout, a free self-hosted help desk and shared mailbox application. This vulnerability allows an attacker to create draft conversations within the system, even when users are restricted to viewing only assigned conversations. The issue arises from a weakness in the save_draft AJAX path, enabling direct POST requests to create drafts that are not visible in the user interface. The vulnerability impacts versions 1.0.0 through 1.8.214, and a patch is available in version 1.8.215.
The primary impact of CVE-2026-41190 lies in the potential for unauthorized data manipulation within the FreeScout system. An attacker, leveraging the weakness in the save_draft endpoint, can create draft conversations that are hidden from regular users. This could be used to inject malicious content, mislead support agents, or disrupt the normal workflow of the help desk. While the drafts are not directly visible, they can still be accessed and potentially modified by administrators or other privileged users, leading to a compromise of data integrity. The blast radius is limited to the FreeScout instance itself, but the impact on the organization's support operations and data security could be significant.
CVE-2026-41190 was published on April 21, 2026. Its CVSS score of 7.1 (HIGH) indicates a significant potential for exploitation. Currently, there are no publicly known proof-of-concept (POC) exploits available. The vulnerability is not listed on KEV or EPSS, suggesting a low to medium probability of active exploitation at this time. Monitor security advisories and threat intelligence feeds for any updates regarding exploitation attempts.
एक्सप्लॉइट स्थिति
EPSS
0.03% (8% शतमक)
CISA SSVC
CVSS वेक्टर
The most effective mitigation for CVE-2026-41190 is to immediately upgrade FreeScout to version 1.8.215 or later, which contains the fix. If upgrading is not immediately feasible, consider implementing a temporary workaround by restricting direct access to the save_draft AJAX endpoint. This can be achieved through web application firewall (WAF) rules or proxy configurations that block unauthorized POST requests to that specific path. Carefully review FreeScout's access control mechanisms to ensure that only authorized users can access and modify draft conversations. After upgrading, confirm the vulnerability is resolved by attempting to create a draft conversation as a non-assignee/creator user and verifying that the draft is not created.
Actualice FreeScout a la versión 1.8.215 o superior para mitigar la vulnerabilidad. Esta actualización corrige una debilidad en el manejo de borradores de conversaciones, previniendo la inyección de borradores ocultos a usuarios no autorizados.
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
It's a vulnerability in FreeScout allowing unauthorized draft creation in hidden conversations when APPSHOWONLYASSIGNEDCONVERSATIONS is enabled, potentially leading to data manipulation.
If you're running FreeScout versions 1.0.0 through 1.8.214 and have APPSHOWONLYASSIGNEDCONVERSATIONS enabled, you are potentially affected.
Upgrade FreeScout to version 1.8.215 or later. As a temporary workaround, restrict direct access to the save_draft AJAX endpoint using a WAF or proxy.
Currently, there are no publicly known exploits or active campaigns targeting this vulnerability, but monitoring is recommended.
Refer to the official FreeScout security advisories and the NVD entry for CVE-2026-41190 for detailed information.
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।