PT-2026-22809 · Laravel+1 · Laravel+1

Mosesox

+1

·

Published

2026-03-03

·

Updated

2026-03-05

·

CVE-2026-28289

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions FreeScout versions 1.8.206 and earlier
Description FreeScout help desk software contains a bypass vulnerability that allows attackers to achieve Remote Code Execution (RCE). This flaw bypasses a previous security patch and allows attackers to upload malicious files, such as .htaccess, by using a zero-width space character to evade file validation checks. The vulnerability exists due to a Time-of-Check to Time-of-Use (TOCTOU) flaw in the
sanitizeUploadedFileName()
function in app/Http/Helper.php. Attackers can exploit this by sending a crafted email to any FreeScout mailbox, enabling them to execute code remotely and potentially gain full control of the server. This can lead to data exfiltration and lateral movement within the affected system. The vulnerability is particularly severe for installations on Apache servers with 'AllowOverride All' enabled.
Recommendations Update to FreeScout version 1.8.207.

Fix

RCE

Unrestricted File Upload

Weakness Enumeration

Related Identifiers

CVE-2026-28289

Affected Products

Freescout
Laravel