๐Ÿ” CVE Alert

CVE-2026-40567

MEDIUM 5.8

FreeScout has HTML Injection in Outgoing Emails via Unsanitized Customer Name in Signature Variables

CVSS Score
5.8
EPSS Score
0.0%
EPSS Percentile
0th

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, an unauthenticated attacker can inject arbitrary HTML into outgoing emails generated by FreeScout by sending an email with a crafted From display name. The name is stored in the database without sanitization and rendered unescaped into outgoing reply emails via the `{%customer.fullName%}` signature variable. This allows embedding phishing links, tracking pixels, and spoofed content inside legitimate support emails sent from the organization's address. Version 1.8.213 fixes the issue.

CWE CWE-116
Vendor freescout-help-desk
Product freescout
Published Apr 21, 2026
Stay Ahead of the Next One

Get instant alerts for freescout-help-desk freescout

Be the first to know when new medium vulnerabilities affecting freescout-help-desk freescout are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None

Affected Versions

freescout-help-desk / freescout
< 1.8.213

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-q8v4-v62h-5528 github.com: https://github.com/freescout-help-desk/freescout/commit/9131b16f80eade81002cb9809a2603f6b61981cf github.com: https://github.com/freescout-help-desk/freescout/releases/tag/1.8.213