FreeScout XSS Flaw Allows Session Hijacking and Data Exfiltration
The National Vulnerability Database has identified a critical stored Cross-Site Scripting (XSS) vulnerability, CVE-2026-40568, affecting FreeScout versions prior to 1.8.213. The issue stems from an inadequate sanitization function that fails to block malicious HTML tags and event handler attributes, allowing authenticated users with signature permissions to inject arbitrary JavaScript. This vulnerability is particularly concerning as the injected code executes automatically when any user, including administrators, opens a conversation in an affected mailbox.
The implications for defenders are significant. Attackers can leverage this flaw for session hijacking, bypassing Content Security Policy (CSP) in some environments, or deploying phishing overlays. More alarmingly, it can be chained with other vulnerabilities, such as mass assignment, to exfiltrate sensitive email data or even propagate malicious behavior across all mailboxes within an organization. The National Vulnerability Database rates this flaw at CVSS 8.5 (HIGH).
Organizations running FreeScout must update to version 1.8.213 or later immediately. Administrators should also review user permissions, particularly the ACCESS_PERM_SIGNATURE privilege, and consider revoking it for users who do not strictly require it. Auditing mailbox signature content for suspicious HTML or JavaScript is also a prudent step.
What This Means For You
- If your organization uses FreeScout, patch to version 1.8.213 immediately to prevent automatic script execution in your help desk. Review and restrict the `ACCESS_PERM_SIGNATURE` permission.
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 6 SIEM formats6 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Drive-by Download via Browser — CVE-2026-40568
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40568 | XSS | FreeScout versions prior to 1.8.213 |
| CVE-2026-40568 | XSS | Vulnerable component: mailbox signature feature |
| CVE-2026-40568 | XSS | Vulnerable function: Helper::stripDangerousTags() in app/Misc/Helper.php:568 |
| CVE-2026-40568 | XSS | Vulnerable endpoint: MailboxesController::updateSave() in app/Http/Controllers/MailboxesController.php:267 |
| CVE-2026-40568 | XSS | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 21, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.