AI description
CVE-2026-28289 is a Remote Code Execution (RCE) vulnerability impacting FreeScout, a help desk and shared inbox application built with the Laravel framework. This flaw, also known as "Mail2Shell," is a patch bypass for a previously identified vulnerability (CVE-2026-27636). It allows an attacker to execute arbitrary code on the server by exploiting a filename sanitization bypass during file uploads. The vulnerability specifically involves the upload of malicious `.htaccess` files. FreeScout's sanitization logic, intended to prevent dangerous file uploads, can be circumvented by prepending a zero-width Unicode character to the filename. This bypasses validation checks, allowing the `.htaccess` file to be saved and subsequently used to execute arbitrary commands, potentially through a PHP webshell. In some scenarios, this can be triggered without authentication or user interaction by sending a specially crafted email to a FreeScout mailbox.
- Description
- FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code Execution (RCE) on the server by uploading a malicious .htaccess file using a zero-width space character prefix to bypass the security check. The vulnerability exists in the sanitizeUploadedFileName() function in app/Http/Helper.php. The function contains a Time-of-Check to Time-of-Use (TOCTOU) flaw where the dot-prefix check occurs before sanitization removes invisible characters. This vulnerability is fixed in 1.8.207.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- freescout
CVSS 3.1
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.9
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security-advisories@github.com
- CWE-434
- Hype score
- Not currently trending
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5903DB5-FCA5-4162-869D-15FFF4B2A450",
"versionEndExcluding": "1.8.207",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]