PT-2026-22809 · Laravel+1 · Laravel+1
Mosesox
+1
·
Published
2026-03-03
·
Updated
2026-03-05
·
CVE-2026-28289
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
FreeScout versions 1.8.206 and earlier
Description
FreeScout help desk software contains a bypass vulnerability that allows attackers to achieve Remote Code Execution (RCE). This flaw bypasses a previous security patch and allows attackers to upload malicious files, such as .htaccess, by using a zero-width space character to evade file validation checks. The vulnerability exists due to a Time-of-Check to Time-of-Use (TOCTOU) flaw in the
sanitizeUploadedFileName() function in app/Http/Helper.php. Attackers can exploit this by sending a crafted email to any FreeScout mailbox, enabling them to execute code remotely and potentially gain full control of the server. This can lead to data exfiltration and lateral movement within the affected system. The vulnerability is particularly severe for installations on Apache servers with 'AllowOverride All' enabled.Recommendations
Update to FreeScout version 1.8.207.
Fix
RCE
Unrestricted File Upload
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
CVE-2026-28289
Affected Products
Freescout
Laravel
References · 17
- https://nvd.nist.gov/vuln/detail/CVE-2026-28289 · Security Note
- https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-5gpc-65p8-ffwp⭐ 4121 🔗 632 · Note
- https://github.com/freescout-help-desk/freescout/commit/f7bc16c56a6b13c06da52ad51fd666546b40818f⭐ 4121 🔗 632 · Note
- https://twitter.com/MosheTov/status/2028906718298619953 · Twitter Post
- https://twitter.com/cybernewslive/status/2029169712093864049 · Twitter Post
- https://twitter.com/infoflowcloud/status/2028975193528393837 · Twitter Post
- https://t.me/true_secator/7962 · Telegram Post
- https://twitter.com/CVEnew/status/2028974428483109103 · Twitter Post
- https://twitter.com/CveFindCom/status/2028979167597900020 · Twitter Post
- https://twitter.com/ThreatSynop/status/2029134345814872561 · Twitter Post
- https://twitter.com/TheHackerWire/status/2029101764042235946 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1rkpfmh/critical_freescout_vulnerability_exposes_servers · Reddit Post
- https://twitter.com/xkzdb/status/2029314943711953296 · Twitter Post
- https://twitter.com/the_yellow_fall/status/2029392781148377185 · Twitter Post
- https://twitter.com/VulmonFeeds/status/2029052218012319845 · Twitter Post