CVE-2026-40497: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in freescout-help-desk freescout
CVE-2026-40497 is a high-severity cross-site scripting (XSS) vulnerability in FreeScout versions prior to 1. 8. 213. The vulnerability arises because the application’s input sanitization function does not remove <style> tags from mailbox signatures, allowing an attacker with mailbox settings access to inject malicious CSS. This CSS injection can exfiltrate CSRF tokens from agents or admins viewing the mailbox, enabling privilege escalation and unauthorized state-changing actions. Version 1. 8. 213 contains a fix addressing this issue.
AI Analysis
Technical Summary
FreeScout's input sanitization function Helper::stripDangerousTags() removes certain dangerous HTML tags but does not remove <style> tags. An attacker with mailbox settings access can inject CSS in the mailbox signature, which is rendered unescaped in conversation views. Due to a permissive Content Security Policy allowing 'unsafe-inline' styles, this CSS can exfiltrate CSRF tokens from users viewing the conversation. With the stolen CSRF token, the attacker can perform privileged actions such as creating admin accounts or changing credentials, effectively escalating privileges from agent to admin. This vulnerability is a result of an incomplete fix for a prior XSS issue and is resolved in FreeScout version 1.8.213.
Potential Impact
An attacker with mailbox settings permissions (admin or agent) can inject malicious CSS to steal CSRF tokens from other users viewing mailbox conversations. This enables the attacker to perform any state-changing actions on behalf of the victim, including privilege escalation to admin level. The vulnerability compromises confidentiality and integrity but does not affect availability.
Mitigation Recommendations
Upgrade FreeScout to version 1.8.213 or later, where the input sanitization function has been updated to properly remove <style> tags and prevent CSS injection. Until upgraded, users with mailbox settings access should be considered a high risk, and access should be restricted if possible. Patch status is not explicitly stated in the vendor advisory content provided, but version 1.8.213 contains the fix.
CVE-2026-40497: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in freescout-help-desk freescout
Description
CVE-2026-40497 is a high-severity cross-site scripting (XSS) vulnerability in FreeScout versions prior to 1. 8. 213. The vulnerability arises because the application’s input sanitization function does not remove <style> tags from mailbox signatures, allowing an attacker with mailbox settings access to inject malicious CSS. This CSS injection can exfiltrate CSRF tokens from agents or admins viewing the mailbox, enabling privilege escalation and unauthorized state-changing actions. Version 1. 8. 213 contains a fix addressing this issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
FreeScout's input sanitization function Helper::stripDangerousTags() removes certain dangerous HTML tags but does not remove <style> tags. An attacker with mailbox settings access can inject CSS in the mailbox signature, which is rendered unescaped in conversation views. Due to a permissive Content Security Policy allowing 'unsafe-inline' styles, this CSS can exfiltrate CSRF tokens from users viewing the conversation. With the stolen CSRF token, the attacker can perform privileged actions such as creating admin accounts or changing credentials, effectively escalating privileges from agent to admin. This vulnerability is a result of an incomplete fix for a prior XSS issue and is resolved in FreeScout version 1.8.213.
Potential Impact
An attacker with mailbox settings permissions (admin or agent) can inject malicious CSS to steal CSRF tokens from other users viewing mailbox conversations. This enables the attacker to perform any state-changing actions on behalf of the victim, including privilege escalation to admin level. The vulnerability compromises confidentiality and integrity but does not affect availability.
Mitigation Recommendations
Upgrade FreeScout to version 1.8.213 or later, where the input sanitization function has been updated to properly remove <style> tags and prevent CSS injection. Until upgraded, users with mailbox settings access should be considered a high risk, and access should be restricted if possible. Patch status is not explicitly stated in the vendor advisory content provided, but version 1.8.213 contains the fix.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-13T19:50:42.115Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e6e4ee19fe3cd2cd6b0ea3
Added to database: 4/21/2026, 2:46:06 AM
Last enriched: 4/21/2026, 3:01:03 AM
Last updated: 4/21/2026, 3:52:13 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.