CVE-2026-41904: FreeScout XSS Delivers Payloads via Auto-Reply
The National Vulnerability Database has disclosed CVE-2026-41904, a high-severity cross-site scripting (XSS) vulnerability in FreeScout, a PHP-based help desk and shared inbox solution. Prior to version 1.8.217, an authenticated user with updateAutoReply permissions could embed an XSS payload within the mailbox’s auto-reply message. This payload would then execute unescaped in the context of any customer’s webmail or mail client upon receiving an auto-reply email.
This is a classic client-side attack vector, but its delivery mechanism via email makes it particularly insidious. Email clients typically lack Content Security Policy (CSP) enforcement, allowing the injected script to run unimpeded. The National Vulnerability Database assigns a CVSS score of 7.6 (High) with a vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N, highlighting the network vector, low attack complexity, and high impact on confidentiality.
Attackers leveraging this vulnerability could steal session cookies, deface the customer’s webmail interface, or phish for credentials directly within the email client. The key here is the trusted channel: customers expect legitimate auto-replies. This trust is weaponized. Organizations using FreeScout must patch to version 1.8.217 immediately to mitigate this risk and prevent potential compromise of customer accounts.
What This Means For You
- If your organization uses FreeScout, prioritize patching to version 1.8.217 without delay. This XSS vulnerability allows an attacker to compromise customer accounts via poisoned auto-reply emails. Audit user permissions for `updateAutoReply` and review any custom auto-reply messages for suspicious code. This is not theoretical; it's a direct path to customer data compromise.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41904: FreeScout Mailbox Auto-Reply XSS Payload
title: CVE-2026-41904: FreeScout Mailbox Auto-Reply XSS Payload
id: scw-2026-05-07-ai-1
status: experimental
level: high
description: |
Detects the specific XSS payload being stored in the FreeScout auto-reply message configuration. This rule targets the vulnerability CVE-2026-41904 where an attacker with updateAutoReply permission can inject a script into the auto-reply message, which is then rendered unescaped in emails sent to customers.
author: SCW Feed Engine (AI-generated)
date: 2026-05-07
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41904/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: email
detection:
selection:
uri|contains:
- '/mail/autoresponder'
cs-method:
- 'POST'
sc-status:
- '200'
cs-uri-query|contains:
- 'message=<script>alert(document.domain)</script>'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41904 | XSS | FreeScout < 1.8.217 |
| CVE-2026-41904 | XSS | Vulnerable component: mailbox auto-reply message |
| CVE-2026-41904 | XSS | Affected permission: updateAutoReply |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 07, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.