Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28289: CWE-434: Unrestricted Upload of File with Dangerous Type in freescout-help-desk freescout

0
Critical
VulnerabilityCVE-2026-28289cvecve-2026-28289cwe-434
Published: Tue Mar 03 2026 (03/03/2026, 22:59:08 UTC)
Source: CVE Database V5
Vendor/Project: freescout-help-desk
Product: freescout

Description

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code Execution (RCE) on the server by uploading a malicious .htaccess file using a zero-width space character prefix to bypass the security check. The vulnerability exists in the sanitizeUploadedFileName() function in app/Http/Helper.php. The function contains a Time-of-Check to Time-of-Use (TOCTOU) flaw where the dot-prefix check occurs before sanitization removes invisible characters. This vulnerability is fixed in 1.8.207.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 19:41:35 UTC

Technical Analysis

CVE-2026-28289 affects FreeScout, an open-source help desk and shared inbox application built on PHP's Laravel framework. The vulnerability stems from a Time-of-Check to Time-of-Use (TOCTOU) flaw in the sanitizeUploadedFileName() function located in app/Http/Helper.php. Specifically, the function checks for dangerous dot-prefixed filenames before sanitizing the filename to remove invisible characters such as zero-width spaces. Attackers exploit this by prefixing a .htaccess filename with a zero-width space character, which bypasses the initial check and allows the upload of a malicious .htaccess file. Since .htaccess files can control Apache web server behavior, this enables remote code execution (RCE) on the server. The exploit requires an authenticated user with file upload permissions but does not require elevated privileges beyond that or user interaction. The vulnerability is present in FreeScout versions 1.8.206 and earlier and was patched in version 1.8.207. The CVSS v3.1 base score is 10.0, reflecting the critical nature of the flaw with network attack vector, no privileges required beyond upload rights, no user interaction, and complete compromise of confidentiality, integrity, and availability. No known exploits have been reported in the wild as of the publication date. The root cause is improper sanitization order and inadequate handling of invisible Unicode characters in filenames, leading to a bypass of security checks.

Potential Impact

The impact of CVE-2026-28289 is severe for organizations using vulnerable versions of FreeScout. Successful exploitation results in remote code execution on the server hosting FreeScout, allowing attackers to execute arbitrary commands with the web server's privileges. This can lead to full system compromise, data theft, destruction, or further lateral movement within the network. Confidentiality, integrity, and availability of the affected system are fully compromised. Since FreeScout is often used to manage customer support tickets and communications, sensitive customer data and internal communications could be exposed or manipulated. The vulnerability requires only authenticated users with upload permissions, which may be common in multi-user environments, increasing the attack surface. The ease of exploitation and critical impact make this a high-risk vulnerability that can lead to significant operational disruption, reputational damage, and regulatory consequences for affected organizations.

Mitigation Recommendations

Organizations should immediately upgrade FreeScout to version 1.8.207 or later, where this vulnerability is patched. As a temporary mitigation, administrators can restrict file upload permissions to only fully trusted users and implement strict monitoring of uploaded files for suspicious filenames, especially those containing invisible Unicode characters or .htaccess files. Web server configurations can be hardened to disallow .htaccess overrides or restrict execution permissions in upload directories. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious file uploads can provide additional protection. Regularly audit user permissions and logs for unusual upload activity. Educate users about the risks of uploading files and enforce strong authentication and access controls. Finally, conduct penetration testing and vulnerability scanning focused on file upload functionalities to detect similar flaws proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T01:52:58.735Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a79342d1a09e29cbc204ee

Added to database: 3/4/2026, 2:04:50 AM

Last enriched: 3/11/2026, 7:41:35 PM

Last updated: 4/18/2026, 10:27:04 AM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses