Description
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.215, FreeScout's module installation feature extracts ZIP archives without validating file paths, allowing an authenticated admin to write files arbitrarily on the server filesystem via a specially crafted ZIP. Version 1.8.215 fixes the vulnerability.
Published: 2026-04-21
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

FreeScout is a free, self‑hosted help desk that allows administrators to install modules via uploaded ZIP archives. Before version 1.8.215 the extraction process does not validate the file paths inside the ZIP, which permits a maliciously crafted archive to write files to arbitrary locations on the server. An authenticated administrator who can install modules might therefore upload and place any file, including executable scripts, resulting in remote code execution.

Affected Systems

The vulnerability affects the FreeScout help desk platform (freescout-help-desk:freescout). All releases prior to 1.8.215 are impacted, while updating to version 1.8.215 or newer removes the flaw.

Risk and Exploitability

The CVSS score of 9.1 indicates high severity. The EPSS score is not currently available and the flaw is not listed in the CISA KEV catalog, but the risk remains significant due to the serious impact. Exploitation requires an authenticated administrator with module upload privileges; an attacker who obtains or compromises such credentials can create arbitrary files on the server, leading to remote code execution. The high CVSS and the potential to run arbitrary code make this a serious threat for any deployment hosting FreeScout.

Generated by OpenCVE AI on April 21, 2026 at 22:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the 1.8.215 patch or newer to FreeScout.
  • If a patch cannot be applied immediately, restrict module uploads to administrators who verify ZIP contents and enforce strict path validation before extraction.
  • Configure the server to disallow writes outside the designated module directory and monitor for unauthorized file creation.

Generated by OpenCVE AI on April 21, 2026 at 22:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Freescout Helpdesk
Freescout Helpdesk freescout
Vendors & Products Freescout Helpdesk
Freescout Helpdesk freescout
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.215, FreeScout's module installation feature extracts ZIP archives without validating file paths, allowing an authenticated admin to write files arbitrarily on the server filesystem via a specially crafted ZIP. Version 1.8.215 fixes the vulnerability.
Title FreeScout has Zip Slip path traversal in module installation that allows arbitrary file write leading to RCE
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Freescout Helpdesk Freescout
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T20:36:59.036Z

Reserved: 2026-04-18T02:51:52.973Z

Link: CVE-2026-41193

cve-icon Vulnrichment

Updated: 2026-04-21T19:57:18.316Z

cve-icon NVD

Status : Deferred

Published: 2026-04-21T18:16:53.253

Modified: 2026-04-22T21:10:14.290

Link: CVE-2026-41193

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:45:16Z

Weaknesses