PT-2026-22809 · Laravel+1 · Laravel+1
Mosesox
+1
·
Published
2026-03-03
·
Updated
2026-04-03
·
CVE-2026-28289
CVSS v3.1
10
Critical
| AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
FreeScout versions 1.8.206 and earlier
Description
FreeScout is susceptible to remote code execution (RCE) vulnerabilities (CVE-2026-27636 and CVE-2026-28289). CVE-2026-27636 allows authenticated users with file upload permissions to execute code by uploading a malicious .htaccess file with a zero-width space character prefix, bypassing security checks due to a Time-of-Check to Time-of-Use (TOCTOU) flaw in the
sanitizeUploadedFileName() function within app/Http/Helper.php. CVE-2026-28289 enables unauthenticated, zero-click RCE via email by exploiting a filename validation bypass using the same zero-width space character. Attackers can send a crafted email to any FreeScout mailbox, leading to remote code execution and potential server takeover. The vulnerability bypasses a previous security patch.Recommendations
Update to version 1.8.207 to address these vulnerabilities.
Exploit
Fix
RCE
Unrestricted File Upload
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Freescout
Laravel