Description
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, an unauthenticated attacker can inject arbitrary HTML into outgoing emails generated by FreeScout by sending an email with a crafted From display name. The name is stored in the database without sanitization and rendered unescaped into outgoing reply emails via the `{%customer.fullName%}` signature variable. This allows embedding phishing links, tracking pixels, and spoofed content inside legitimate support emails sent from the organization's address. Version 1.8.213 fixes the issue.
Published: 2026-04-21
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: HTML Injection in Outgoing Emails via Unsanitized Signature Variable
Action: Patch
AI Analysis

Impact

FreeScout has a flaw that allows an attacker to inject arbitrary HTML into outgoing support emails. The vulnerability arises because the system stores the customer’s full name without sanitization and later renders it unescaped inside the signature variable {%customer.fullName%}. By sending an email with a crafted From display name, an attacker can embed phishing links, tracking pixels, or other malicious content that appears as part of legitimate outgoing emails. The weakness is a classic example of improper input handling (CWE-116), and its use in email signatures enables credential‑stealing and social‑engineering attacks against recipients.

Affected Systems

The issue affects the freescout-help-desk:freescout product, specifically all installations running versions older than 1.8.213. Versions 1.8.213 and later include a patch that sanitizes the customer name before rendering it in signatures, eliminating the injection vector. Users running the free self‑hosted help desk and shared mailbox solution should verify that they are on a supported release.

Risk and Exploitability

The CVSS score of 5.8 indicates a moderate risk, combining potential abuse (phishing) with limited impact on system integrity. The EPSS score is not provided, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by simply sending a spam or phishing email from any external address; no authentication is required, meaning the vector is easily achievable. Because the payload is delivered via Office or webmail clients that interpret HTML in messages, the impact can be immediate and widespread if the organization’s support team forwards the compromised emails to customers.

Generated by OpenCVE AI on April 22, 2026 at 03:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FreeScout to version 1.8.213 or later so that customer names are properly sanitized before use in email signatures.
  • Configure your mail server or email gateway to sanitize or remove HTML code from outgoing emails or block known injection patterns.
  • Disable or restrict the use of the {%customer.fullName%} variable in email signatures until the patch is applied, or switch to plain-text signatures.

Generated by OpenCVE AI on April 22, 2026 at 03:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 21 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Freescout Helpdesk
Freescout Helpdesk freescout
Vendors & Products Freescout Helpdesk
Freescout Helpdesk freescout

Tue, 21 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, an unauthenticated attacker can inject arbitrary HTML into outgoing emails generated by FreeScout by sending an email with a crafted From display name. The name is stored in the database without sanitization and rendered unescaped into outgoing reply emails via the `{%customer.fullName%}` signature variable. This allows embedding phishing links, tracking pixels, and spoofed content inside legitimate support emails sent from the organization's address. Version 1.8.213 fixes the issue.
Title FreeScout has HTML Injection in Outgoing Emails via Unsanitized Customer Name in Signature Variables
Weaknesses CWE-116
References
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N'}


Subscriptions

Freescout Helpdesk Freescout
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T19:17:33.873Z

Reserved: 2026-04-14T13:24:29.474Z

Link: CVE-2026-40567

cve-icon Vulnrichment

Updated: 2026-04-21T19:17:30.844Z

cve-icon NVD

Status : Deferred

Published: 2026-04-21T17:16:55.153

Modified: 2026-04-22T21:10:14.290

Link: CVE-2026-40567

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T03:15:06Z

Weaknesses