Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freescout
Freescout freescout |
|
| CPEs | cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Freescout
Freescout freescout |
Wed, 25 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freescout Helpdesk
Freescout Helpdesk freescout |
|
| Vendors & Products |
Freescout Helpdesk
Freescout Helpdesk freescout |
Wed, 25 Feb 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.206, FreeScout's `TokenAuth` middleware uses a predictable authentication token computed as `MD5(user_id + created_at + APP_KEY)`. This token is static (never expires/rotates), and if an attacker obtains the `APP_KEY` — a well-documented and common exposure vector in Laravel applications — they can compute a valid token for any user, including the administrator, achieving full account takeover without any password. This vulnerability can be exploited on its own or in combination with CVE-2026-27636. Version 1.8.206 fixes both vulnerabilities. | |
| Title | FreeScout's Predictable Authentication Token Enables Account Takeover | |
| Weaknesses | CWE-330 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-25T15:21:52.817Z
Reserved: 2026-02-20T22:02:30.029Z
Link: CVE-2026-27637
Updated: 2026-02-25T15:21:36.440Z
Status : Analyzed
Published: 2026-02-25T04:16:04.110
Modified: 2026-02-26T16:08:44.857
Link: CVE-2026-27637
No data.
OpenCVE Enrichment
Updated: 2026-02-25T11:34:46Z