Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32754: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in freescout-help-desk freescout

0
Critical
VulnerabilityCVE-2026-32754cvecve-2026-32754cwe-79cwe-116
Published: Thu Mar 19 2026 (03/19/2026, 21:35:17 UTC)
Source: CVE Database V5
Vendor/Project: freescout-help-desk
Product: freescout

Description

CVE-2026-32754 is a critical stored cross-site scripting (XSS) vulnerability in FreeScout versions prior to 1. 8. 209. The flaw arises because incoming email bodies are stored without sanitization and rendered unescaped in outgoing email notifications, allowing an unauthenticated attacker to inject malicious HTML or JavaScript by sending a crafted email. When agents or admins open these notifications, the injected code executes, potentially enabling phishing, session hijacking, credential theft, and account takeover. Exploitation requires only sending an email and user interaction to open the notification, with no authentication needed. This vulnerability affects all recipients of the notification simultaneously and has a CVSS score of 9. 3, indicating critical severity. The issue has been fixed in version 1. 8.

AI-Powered Analysis

AILast updated: 03/19/2026, 22:08:40 UTC

Technical Analysis

FreeScout is an open-source help desk and shared inbox application built on PHP's Laravel framework. Versions 1.8.208 and earlier contain a stored cross-site scripting (XSS) vulnerability (CVE-2026-32754) due to improper input neutralization in email notification templates. Specifically, incoming email bodies are stored directly in the database without sanitization and later rendered in outgoing email notifications using Laravel Blade's raw output syntax {!! $thread->body !!}, which does not escape HTML or JavaScript content. This allows an unauthenticated attacker to send a specially crafted email containing malicious HTML or JavaScript payloads. When a subscribed agent or admin opens the notification email, the malicious code executes in their context. This can lead to universal HTML injection, enabling phishing attacks, tracking, and in vulnerable email clients, JavaScript execution that can result in session hijacking, credential theft, and full account takeover. The vulnerability affects all recipients of the notification simultaneously, amplifying its impact. The vulnerability has a CVSS v3.1 base score of 9.3, reflecting its critical nature, with an attack vector of network, no privileges required, low attack complexity, user interaction required, and scope changed. No known exploits are currently reported in the wild. The issue was addressed and fixed in FreeScout version 1.8.209 by properly sanitizing and escaping email body content before rendering.

Potential Impact

This vulnerability poses a severe risk to organizations using FreeScout versions prior to 1.8.209. An attacker can remotely exploit the flaw without authentication by sending a malicious email, which when viewed by help desk agents or administrators, can execute arbitrary HTML or JavaScript code. This can lead to widespread phishing attacks, unauthorized tracking, and in vulnerable email clients, execution of scripts that compromise session tokens, steal credentials, and enable account takeover. The compromise of help desk accounts can lead to further lateral movement within an organization, exposure of sensitive customer data, and disruption of support operations. Since the vulnerability affects all recipients of the notification, the scale of impact can be extensive within affected organizations. The critical CVSS score underscores the high potential for confidentiality and integrity breaches, although availability impact is minimal. Organizations relying on FreeScout for customer support and internal ticketing are at significant risk until patched.

Mitigation Recommendations

Organizations should immediately upgrade FreeScout to version 1.8.209 or later, where this vulnerability is fixed. Until the update can be applied, administrators should implement strict email filtering to block suspicious or unexpected emails to the FreeScout system to reduce the risk of malicious payload delivery. Additionally, configuring FreeScout or its underlying Laravel framework to sanitize and escape all user-generated content before rendering can mitigate exploitation. Monitoring email notification templates and logs for unusual or unexpected HTML content can help detect attempted exploitation. Educating help desk agents and administrators to be cautious when opening email notifications and to report suspicious emails is also recommended. Employing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting FreeScout endpoints can provide an additional layer of defense. Finally, organizations should review and harden their email client security settings to limit JavaScript execution in emails.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T18:53:03.532Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bc708fe32a4fbe5ffd51ab

Added to database: 3/19/2026, 9:54:23 PM

Last enriched: 3/19/2026, 10:08:40 PM

Last updated: 3/20/2026, 12:09:01 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses