FreeScout CVE-2026-41906: Agent Can Expose Hidden Customer Data
The National Vulnerability Database has disclosed CVE-2026-41906, a high-severity vulnerability (CVSS 7.1) affecting FreeScout, a PHP-based help desk and shared inbox solution. Prior to version 1.8.214, a low-privileged agent could exploit a logical flaw to bind a visible conversation to a customer hidden in another mailbox. This is a critical bypass of access controls.
The vulnerability stems from an incomplete access control enforcement. While the frontend correctly filters out-of-scope customers in searches, the backend conversation_change_customer action fails to validate the supplied customer_email against the agent’s permissions. This allows an attacker to forge a request and link a conversation they can see to a customer they should not be able to access, potentially exposing sensitive customer information to unauthorized personnel.
This issue, categorized as CWE-639 (Notion of Authority), underscores the importance of consistent security checks across both client-side and server-side logic. Defenders running FreeScout must prioritize updating to version 1.8.214 or later. Failing to do so leaves customer data vulnerable to internal actors who might not even realize the full extent of their access, or worse, malicious insiders seeking to exfiltrate information.
What This Means For You
- If your organization uses FreeScout, you need to verify your version immediately. This isn't theoretical; a low-privileged agent, someone already inside your network, can link conversations to customers they shouldn't see. Patch to version 1.8.214 or higher right now and audit agent activity for any unusual customer association changes.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
FreeScout CVE-2026-41906: Unauthorized Customer Data Binding
title: FreeScout CVE-2026-41906: Unauthorized Customer Data Binding
id: scw-2026-05-07-ai-1
status: experimental
level: high
description: |
This rule detects attempts to exploit FreeScout CVE-2026-41906 by identifying requests to the 'conversation_change_customer' endpoint. An attacker with low privileges can abuse this endpoint to bind visible conversations to hidden customers in other mailboxes, exposing sensitive customer data. This detection focuses on the specific backend action targeted by the vulnerability.
author: SCW Feed Engine (AI-generated)
date: 2026-05-07
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41906/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/conversation_change_customer'
cs-method|exact:
- 'POST'
sc-status|exact:
- '200'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41906 | Auth Bypass | FreeScout < 1.8.214 |
| CVE-2026-41906 | Auth Bypass | FreeScout vulnerable component: conversation_change_customer action |
| CVE-2026-41906 | Auth Bypass | FreeScout vulnerable endpoint: mailbox-filtered search endpoint |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 07, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.