Description
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.214, a low-privileged agent can edit a visible customer and add an email address already owned by a hidden customer in another mailbox. The server discloses the hidden customer’s name and profile URL in the success flash, reassigns the hidden email to the visible customer, and rebinds hidden-mailbox conversations for that email to the visible customer. Version 1.8.214 fixes the issue.
Published: 2026-04-21
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Customer Email Takeover and Impersonation
Action: Immediate Patch
AI Analysis

Impact

A low‑privileged agent can edit an existing customer record and add an e‑mail address already owned by a hidden customer in another mailbox. The system reveals the hidden customer’s name and profile URL in the success flash, reassigns the email to the visible customer, and rebinds the hidden‑mailbox conversations for that e‑mail to the visible customer. The result is an unauthorized takeover of the customer’s account and potential access to the hidden mailbox’s communications, representing a serious compromise of customer data integrity and confidentiality. This weakness is a classic example of improper access control (CWE‑639).

Affected Systems

The flaw affects customers running freescout-help-desk:freescout before version 1.8.214, the latest release that contains the fix.

Risk and Exploitability

The CVSS score of 7.6 indicates high severity. The EPSS score is not available and the vulnerability is not listed in CISA’s KEV catalog. The likely attack path involves a low‑privileged agent who has permission to edit customer records; by adding an e‑mail address that belongs to a hidden customer, the agent can trigger the server to reassign the address and expose sensitive information. Because the attacker only needs an existing account with editing privileges, exploitation is considered feasible in an environment where such agents exist. No additional prerequisites beyond normal agent access are required.

Generated by OpenCVE AI on April 21, 2026 at 22:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade freescout to version 1.8.214 or later.
  • Restrict low‑privileged agents from editing customer e‑mail addresses or from adding e‑mail addresses that already exist in another mailbox.
  • Audit existing customer accounts for e‑mail addresses that appear in multiple mailboxes and resolve duplicates.

Generated by OpenCVE AI on April 21, 2026 at 22:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Freescout Helpdesk
Freescout Helpdesk freescout
Vendors & Products Freescout Helpdesk
Freescout Helpdesk freescout
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 21 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Description FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.214, a low-privileged agent can edit a visible customer and add an email address already owned by a hidden customer in another mailbox. The server discloses the hidden customer’s name and profile URL in the success flash, reassigns the hidden email to the visible customer, and rebinds hidden-mailbox conversations for that email to the visible customer. Version 1.8.214 fixes the issue.
Title FreeScout has Customer Edit Cross-Mailbox Email Takeover
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}


Subscriptions

Freescout Helpdesk Freescout
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T20:37:22.372Z

Reserved: 2026-04-14T13:24:29.476Z

Link: CVE-2026-40589

cve-icon Vulnrichment

Updated: 2026-04-21T20:17:33.850Z

cve-icon NVD

Status : Received

Published: 2026-04-21T17:16:56.660

Modified: 2026-04-21T21:16:42.640

Link: CVE-2026-40589

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:45:16Z

Weaknesses