CVE-2026-32754
Received Received - Intake
Stored XSS in FreeScout Email Notifications Enables Account Takeover

Publication date: 2026-03-19

Last updated on: 2026-03-23

Assigner: GitHub, Inc.

Description
FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Versions 1.8.208 and below are vulnerable to Stored Cross-Site Scripting (XSS) through FreeScout's email notification templates. Incoming email bodies are stored in the database without sanitization and rendered unescaped in outgoing email notifications using Blade's raw output syntax {!! $thread->body !!}. An unauthenticated attacker can exploit this vulnerability by simply sending an email, and when opened by any subscribed agent or admin as part of their normal workflow, enabling universal HTML injection (phishing, tracking) and, in vulnerable email clients, JavaScript execution (session hijacking, credential theft, account takeover) affecting all recipients simultaneously. This issue has been fixed in version 1.8.209.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-19
Last Modified
2026-03-23
Generated
2026-05-07
AI Q&A
2026-03-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
freescout freescout to 1.8.209 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-116 The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

FreeScout versions 1.8.208 and below have a Stored Cross-Site Scripting (XSS) vulnerability in their email notification templates. Incoming email bodies are stored in the database without any sanitization and are rendered unescaped in outgoing email notifications using Blade's raw output syntax. This allows an unauthenticated attacker to send a malicious email that, when opened by any subscribed agent or admin, can inject universal HTML content or execute JavaScript in vulnerable email clients.


How can this vulnerability impact me? :

This vulnerability can lead to phishing attacks, user tracking, session hijacking, credential theft, and account takeover. Since the malicious content is stored and rendered for all recipients, it can affect all subscribed agents or admins simultaneously, potentially compromising multiple accounts and sensitive information.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


What immediate steps should I take to mitigate this vulnerability?

The vulnerability in FreeScout versions 1.8.208 and below can be mitigated by upgrading to version 1.8.209 or later, where the issue has been fixed.

Since the vulnerability involves stored cross-site scripting through email notification templates, immediate mitigation involves applying the patch or update provided by the vendor.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart