CVE-2026-32754

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Versions 1.8.208 and below are vulnerable to Stored Cross-Site Scripting (XSS) through FreeScout's email notification templates. Incoming email bodies are stored in the database without sanitization and rendered unescaped in outgoing email notifications using Blade's raw output syntax {!! $thread->body !!}. An unauthenticated attacker can exploit this vulnerability by simply sending an email, and when opened by any subscribed agent or admin as part of their normal workflow, enabling universal HTML injection (phishing, tracking) and, in vulnerable email clients, JavaScript execution (session hijacking, credential theft, account takeover) affecting all recipients simultaneously. This issue has been fixed in version 1.8.209.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*

History

23 Mar 2026, 19:14

Type Values Removed Values Added
References () https://github.com/freescout-help-desk/freescout/commit/3329379db38a86cf7069b0709061b95a7d38985b - () https://github.com/freescout-help-desk/freescout/commit/3329379db38a86cf7069b0709061b95a7d38985b - Patch
References () https://github.com/freescout-help-desk/freescout/releases/tag/1.8.209 - () https://github.com/freescout-help-desk/freescout/releases/tag/1.8.209 - Product, Release Notes
References () https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-56h2-5556-r6mg - () https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-56h2-5556-r6mg - Exploit, Mitigation, Vendor Advisory
CPE cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*
Summary
  • (es) FreeScout es una mesa de ayuda gratuita y una bandeja de entrada compartida construida con el framework Laravel de PHP. Las versiones 1.8.208 e inferiores son vulnerables a Cross-Site Scripting Almacenado (XSS) a través de las plantillas de notificación por correo electrónico de FreeScout. Los cuerpos de los correos electrónicos entrantes se almacenan en la base de datos sin sanitización y se renderizan sin escapar en las notificaciones de correo electrónico salientes utilizando la sintaxis de salida sin procesar de Blade {!! $thread->body !!}. Un atacante no autenticado puede explotar esta vulnerabilidad simplemente enviando un correo electrónico, y cuando es abierto por cualquier agente o administrador suscrito como parte de su flujo de trabajo normal, permitiendo la inyección universal de HTML (phishing, seguimiento) y, en clientes de correo electrónico vulnerables, la ejecución de JavaScript (secuestro de sesión, robo de credenciales, toma de control de cuenta) afectando a todos los destinatarios simultáneamente. Este problema ha sido solucionado en la versión 1.8.209.
First Time Freescout
Freescout freescout

19 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 22:16

Updated : 2026-03-23 19:14


NVD link : CVE-2026-32754

Mitre link : CVE-2026-32754

CVE.ORG link : CVE-2026-32754


JSON object : View

Products Affected

freescout

  • freescout
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-116

Improper Encoding or Escaping of Output