CVE-2026-32754: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in freescout-help-desk freescout
CVE-2026-32754 is a critical stored cross-site scripting (XSS) vulnerability in FreeScout versions prior to 1. 8. 209. The flaw arises because incoming email bodies are stored without sanitization and rendered unescaped in outgoing email notifications, allowing an unauthenticated attacker to inject malicious HTML or JavaScript by sending a crafted email. When agents or admins open these notifications, the injected code executes, potentially enabling phishing, session hijacking, credential theft, and account takeover. Exploitation requires only sending an email and user interaction to open the notification, with no authentication needed. This vulnerability affects all recipients of the notification simultaneously and has a CVSS score of 9. 3, indicating critical severity. The issue has been fixed in version 1. 8.
AI Analysis
Technical Summary
FreeScout is an open-source help desk and shared inbox application built on PHP's Laravel framework. Versions 1.8.208 and earlier contain a stored cross-site scripting (XSS) vulnerability (CVE-2026-32754) due to improper input neutralization in email notification templates. Specifically, incoming email bodies are stored directly in the database without sanitization and later rendered in outgoing email notifications using Laravel Blade's raw output syntax {!! $thread->body !!}, which does not escape HTML or JavaScript content. This allows an unauthenticated attacker to send a specially crafted email containing malicious HTML or JavaScript payloads. When a subscribed agent or admin opens the notification email, the malicious code executes in their context. This can lead to universal HTML injection, enabling phishing attacks, tracking, and in vulnerable email clients, JavaScript execution that can result in session hijacking, credential theft, and full account takeover. The vulnerability affects all recipients of the notification simultaneously, amplifying its impact. The vulnerability has a CVSS v3.1 base score of 9.3, reflecting its critical nature, with an attack vector of network, no privileges required, low attack complexity, user interaction required, and scope changed. No known exploits are currently reported in the wild. The issue was addressed and fixed in FreeScout version 1.8.209 by properly sanitizing and escaping email body content before rendering.
Potential Impact
This vulnerability poses a severe risk to organizations using FreeScout versions prior to 1.8.209. An attacker can remotely exploit the flaw without authentication by sending a malicious email, which when viewed by help desk agents or administrators, can execute arbitrary HTML or JavaScript code. This can lead to widespread phishing attacks, unauthorized tracking, and in vulnerable email clients, execution of scripts that compromise session tokens, steal credentials, and enable account takeover. The compromise of help desk accounts can lead to further lateral movement within an organization, exposure of sensitive customer data, and disruption of support operations. Since the vulnerability affects all recipients of the notification, the scale of impact can be extensive within affected organizations. The critical CVSS score underscores the high potential for confidentiality and integrity breaches, although availability impact is minimal. Organizations relying on FreeScout for customer support and internal ticketing are at significant risk until patched.
Mitigation Recommendations
Organizations should immediately upgrade FreeScout to version 1.8.209 or later, where this vulnerability is fixed. Until the update can be applied, administrators should implement strict email filtering to block suspicious or unexpected emails to the FreeScout system to reduce the risk of malicious payload delivery. Additionally, configuring FreeScout or its underlying Laravel framework to sanitize and escape all user-generated content before rendering can mitigate exploitation. Monitoring email notification templates and logs for unusual or unexpected HTML content can help detect attempted exploitation. Educating help desk agents and administrators to be cautious when opening email notifications and to report suspicious emails is also recommended. Employing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting FreeScout endpoints can provide an additional layer of defense. Finally, organizations should review and harden their email client security settings to limit JavaScript execution in emails.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2026-32754: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in freescout-help-desk freescout
Description
CVE-2026-32754 is a critical stored cross-site scripting (XSS) vulnerability in FreeScout versions prior to 1. 8. 209. The flaw arises because incoming email bodies are stored without sanitization and rendered unescaped in outgoing email notifications, allowing an unauthenticated attacker to inject malicious HTML or JavaScript by sending a crafted email. When agents or admins open these notifications, the injected code executes, potentially enabling phishing, session hijacking, credential theft, and account takeover. Exploitation requires only sending an email and user interaction to open the notification, with no authentication needed. This vulnerability affects all recipients of the notification simultaneously and has a CVSS score of 9. 3, indicating critical severity. The issue has been fixed in version 1. 8.
AI-Powered Analysis
Technical Analysis
FreeScout is an open-source help desk and shared inbox application built on PHP's Laravel framework. Versions 1.8.208 and earlier contain a stored cross-site scripting (XSS) vulnerability (CVE-2026-32754) due to improper input neutralization in email notification templates. Specifically, incoming email bodies are stored directly in the database without sanitization and later rendered in outgoing email notifications using Laravel Blade's raw output syntax {!! $thread->body !!}, which does not escape HTML or JavaScript content. This allows an unauthenticated attacker to send a specially crafted email containing malicious HTML or JavaScript payloads. When a subscribed agent or admin opens the notification email, the malicious code executes in their context. This can lead to universal HTML injection, enabling phishing attacks, tracking, and in vulnerable email clients, JavaScript execution that can result in session hijacking, credential theft, and full account takeover. The vulnerability affects all recipients of the notification simultaneously, amplifying its impact. The vulnerability has a CVSS v3.1 base score of 9.3, reflecting its critical nature, with an attack vector of network, no privileges required, low attack complexity, user interaction required, and scope changed. No known exploits are currently reported in the wild. The issue was addressed and fixed in FreeScout version 1.8.209 by properly sanitizing and escaping email body content before rendering.
Potential Impact
This vulnerability poses a severe risk to organizations using FreeScout versions prior to 1.8.209. An attacker can remotely exploit the flaw without authentication by sending a malicious email, which when viewed by help desk agents or administrators, can execute arbitrary HTML or JavaScript code. This can lead to widespread phishing attacks, unauthorized tracking, and in vulnerable email clients, execution of scripts that compromise session tokens, steal credentials, and enable account takeover. The compromise of help desk accounts can lead to further lateral movement within an organization, exposure of sensitive customer data, and disruption of support operations. Since the vulnerability affects all recipients of the notification, the scale of impact can be extensive within affected organizations. The critical CVSS score underscores the high potential for confidentiality and integrity breaches, although availability impact is minimal. Organizations relying on FreeScout for customer support and internal ticketing are at significant risk until patched.
Mitigation Recommendations
Organizations should immediately upgrade FreeScout to version 1.8.209 or later, where this vulnerability is fixed. Until the update can be applied, administrators should implement strict email filtering to block suspicious or unexpected emails to the FreeScout system to reduce the risk of malicious payload delivery. Additionally, configuring FreeScout or its underlying Laravel framework to sanitize and escape all user-generated content before rendering can mitigate exploitation. Monitoring email notification templates and logs for unusual or unexpected HTML content can help detect attempted exploitation. Educating help desk agents and administrators to be cautious when opening email notifications and to report suspicious emails is also recommended. Employing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting FreeScout endpoints can provide an additional layer of defense. Finally, organizations should review and harden their email client security settings to limit JavaScript execution in emails.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-13T18:53:03.532Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bc708fe32a4fbe5ffd51ab
Added to database: 3/19/2026, 9:54:23 PM
Last enriched: 3/19/2026, 10:08:40 PM
Last updated: 3/20/2026, 12:09:01 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.