CVE-2026-32754
Stored XSS in FreeScout Email Notifications Enables Account Takeover
Publication date: 2026-03-19
Last updated on: 2026-03-23
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| freescout | freescout | to 1.8.209 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-116 | The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
FreeScout versions 1.8.208 and below have a Stored Cross-Site Scripting (XSS) vulnerability in their email notification templates. Incoming email bodies are stored in the database without any sanitization and are rendered unescaped in outgoing email notifications using Blade's raw output syntax. This allows an unauthenticated attacker to send a malicious email that, when opened by any subscribed agent or admin, can inject universal HTML content or execute JavaScript in vulnerable email clients.
How can this vulnerability impact me? :
This vulnerability can lead to phishing attacks, user tracking, session hijacking, credential theft, and account takeover. Since the malicious content is stored and rendered for all recipients, it can affect all subscribed agents or admins simultaneously, potentially compromising multiple accounts and sensitive information.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
What immediate steps should I take to mitigate this vulnerability?
The vulnerability in FreeScout versions 1.8.208 and below can be mitigated by upgrading to version 1.8.209 or later, where the issue has been fixed.
Since the vulnerability involves stored cross-site scripting through email notification templates, immediate mitigation involves applying the patch or update provided by the vendor.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know