FreeScout CSS Injection Allows Privilege Escalation

FreeScout CSS Injection Allows Privilege Escalation

The National Vulnerability Database has detailed CVE-2026-40497, a high-severity vulnerability (CVSS 8.1) in FreeScout, a self-hosted help desk solution. Versions prior to 1.8.213 are susceptible to a CSS injection flaw stemming from an incomplete fix for a previous XSS vulnerability. Specifically, while the Helper::stripDangerousTags() function was applied to the mailbox signature field, it failed to strip <style> tags, leaving a critical gap.

An attacker with agent-level access, or any access to mailbox settings, can inject malicious CSS attribute selectors into the mailbox signature. When an administrator or another agent views a conversation in that mailbox, the injected CSS executes. This allows the attacker to exfiltrate the victim’s CSRF token. With a valid CSRF token, the attacker can then perform any state-changing action as the victim, including creating new admin accounts or altering existing credentials, effectively escalating privileges from agent to full administrator. This is a direct path to full system compromise.

This isn’t just a theoretical flaw; it’s a bypass of an earlier XSS patch. Defenders running FreeScout must understand that incomplete sanitization is as dangerous as no sanitization at all. The attacker’s calculus here is straightforward: leverage a trusted input field to gain control. Update to FreeScout version 1.8.213 immediately to mitigate this risk.

What This Means For You

  • If your organization uses FreeScout, you need to check your version immediately. Patch to version 1.8.213 without delay. Audit your admin and agent accounts for any unauthorized changes or new accounts created, especially if you had agents with mailbox setting permissions. This is a privilege escalation vulnerability that directly leads to full system compromise.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

FreeScout Mailbox Settings CSS Injection - CVE-2026-40497

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40497 Privilege Escalation FreeScout < 1.8.213
CVE-2026-40497 Information Disclosure FreeScout < 1.8.213, vulnerable function: Helper::stripDangerousTags()
CVE-2026-40497 Code Injection FreeScout < 1.8.213, vulnerable endpoint: POST /mailbox/settings/{id}, via mailbox signature field
CVE-2026-40497 XSS FreeScout < 1.8.213, CSS injection via