FreeScout Vulnerability Allows Low-Privilege Agents to Expose Hidden Customer Data

FreeScout Vulnerability Allows Low-Privilege Agents to Expose Hidden Customer Data

The National Vulnerability Database has detailed a critical vulnerability (CVE-2026-40591) in FreeScout, a popular self-hosted help desk solution. Versions prior to 1.8.214 suffer from an improper access control flaw. Specifically, a low-privileged agent creating a phone conversation can bypass mailbox-scoped customer visibility rules. This allows them to associate a conversation from one mailbox with a hidden customer record in another mailbox and even add a new email alias to that customer’s profile.

The implications for organizations using FreeScout are significant. Attackers with even minimal access to the help desk system can pivot to access sensitive customer information across different mailboxes. This isn’t just about data leakage; it’s about the potential for unauthorized data modification and the unraveling of customer privacy controls within the help desk environment. The CVSS score of 7.1 (HIGH) underscores the severity of this exposure.

Defenders must prioritize upgrading FreeScout instances to version 1.8.214 or later immediately. Organizations should also audit their FreeScout configurations and logs for any suspicious activity related to customer record manipulation or unauthorized access. Understanding how customer data is segmented and protected within your help desk is paramount, especially when dealing with self-hosted solutions where direct oversight is crucial.

What This Means For You

  • If your organization uses FreeScout, patch immediately to version 1.8.214 or higher. Verify that all agents are operating within their intended mailbox scopes and audit customer records for any unauthorized additions or modifications, particularly email aliases.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

FreeScout Phone Conversation Creation with Suspicious Customer ID - CVE-2026-40591

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40591 Vulnerability CVE-2026-40591
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 21, 2026 at 20:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-41194 — FreeScout is a free self-hosted help desk and shared

CVE-2026-41194 — FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.215, the mailbox OAuth disconnect action is implemented as `GET...

vulnerabilityCVEmedium-severitycwe-352
/SCW Vulnerability Desk /MEDIUM /5.4 /⚑ 2 IOCs /⚙ 3 Sigma

FreeScout Vulnerability: Unrestricted File Write via ZIP Upload

CVE-2026-41193 — FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.215, FreeScout's module installation feature extracts ZIP archives without validating...

vulnerabilityCVEcriticalhigh-severitycwe-22
/SCW Vulnerability Desk /CRITICAL /9.1 /⚑ 3 IOCs /⚙ 3 Sigma

FreeScout Attachment Flaw Allows Data Deletion

CVE-2026-41192 — FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.215, the reply and draft flows trust client-supplied encrypted attachment...

vulnerabilityCVEhigh-severitycwe-862
/SCW Vulnerability Desk /HIGH /7.1 /⚑ 3 IOCs /⚙ 3 Sigma