Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32753: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in freescout-help-desk freescout

0
High
VulnerabilityCVE-2026-32753cvecve-2026-32753cwe-80
Published: Thu Mar 19 2026 (03/19/2026, 21:26:09 UTC)
Source: CVE Database V5
Vendor/Project: freescout-help-desk
Product: freescout

Description

CVE-2026-32753 is a high-severity cross-site scripting (XSS) vulnerability in FreeScout versions prior to 1. 8. 209. It arises from improper sanitization of SVG files disguised with a . png extension and a content type of image/svg+xml, allowing malicious JavaScript execution. Authenticated users can upload crafted SVG files that bypass file extension and content-type checks, causing the server to render the SVG inline. When other users or administrators view the malicious file, the embedded script executes, enabling actions on their behalf without their consent. This vulnerability exploits weaknesses in the attachment view logic and SVG sanitization fallback mechanisms. It requires no special privileges beyond authentication and no user interaction beyond viewing the malicious content. The issue has been fixed in version 1.

AI-Powered Analysis

AILast updated: 03/19/2026, 22:08:53 UTC

Technical Analysis

CVE-2026-32753 is a cross-site scripting vulnerability classified under CWE-80 affecting FreeScout, a PHP Laravel-based help desk and shared inbox application. The flaw exists in versions 1.8.208 and earlier due to improper neutralization of script-related HTML tags within SVG files uploaded as attachments. FreeScout restricts inline rendering of uploaded files based on file extension and declared Content-Type headers, allowing only 'safe' files like .png images to be rendered inline, while others are served as attachments. However, the vulnerability arises because an attacker can upload an SVG file containing malicious JavaScript with a filename using an allowed extension (e.g., .png) and a Content-Type of image/svg+xml. This combination bypasses the extension and content-type checks, causing the server to treat the file as a safe image and render it inline. Additionally, the SVG sanitizer's fallback mechanism on invalid XML is insufficient, allowing script execution. Any authenticated user can exploit this by uploading such a crafted file and setting up a URL that, when visited by other users or administrators, triggers the embedded JavaScript. This script can perform actions on behalf of the victim, potentially leading to session hijacking, privilege escalation, or unauthorized operations within the application. The vulnerability does not require elevated privileges beyond authentication and does not need victim interaction beyond viewing the malicious content. The issue was addressed and fixed in FreeScout version 1.8.209 by improving file validation and sanitization processes.

Potential Impact

This vulnerability poses a significant risk to organizations using affected FreeScout versions, as it enables authenticated attackers to execute arbitrary JavaScript in the context of other users, including administrators. The impact includes potential session hijacking, unauthorized actions such as modifying tickets or user data, privilege escalation, and data leakage. Since FreeScout is used for help desk and shared inbox management, compromise could lead to exposure of sensitive customer information and disruption of support operations. The ease of exploitation—requiring only authentication and no special privileges—means insider threats or compromised accounts can leverage this flaw. The vulnerability could also be chained with other attacks to gain broader access or persistence. Although no known exploits are reported in the wild yet, the high CVSS score (8.5) and the nature of the flaw make it a critical risk that could affect confidentiality, integrity, and availability of organizational support systems.

Mitigation Recommendations

Organizations should immediately upgrade FreeScout to version 1.8.209 or later, where the vulnerability is fixed. Until upgrading, administrators should restrict file upload permissions to trusted users only and disable inline rendering of image files with ambiguous or potentially unsafe content types. Implement additional server-side validation to verify that file content matches the declared extension and MIME type, especially for SVG files. Employ strict Content Security Policy (CSP) headers to limit script execution and reduce XSS impact. Regularly audit and monitor uploaded files for suspicious content and review user permissions to minimize the risk of malicious uploads. Educate users about the risks of uploading files and enforce multi-factor authentication to reduce the risk of account compromise. Finally, conduct penetration testing focused on file upload and rendering functionalities to detect similar weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T18:53:03.532Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bc708fe32a4fbe5ffd51a6

Added to database: 3/19/2026, 9:54:23 PM

Last enriched: 3/19/2026, 10:08:53 PM

Last updated: 3/20/2026, 12:08:55 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses