CVE-2026-40567
FreeScout has HTML Injection in Outgoing Emails via Unsanitized Customer Name in Signature Variables
CVSS Score
5.8
EPSS Score
0.0%
EPSS Percentile
0th
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, an unauthenticated attacker can inject arbitrary HTML into outgoing emails generated by FreeScout by sending an email with a crafted From display name. The name is stored in the database without sanitization and rendered unescaped into outgoing reply emails via the `{%customer.fullName%}` signature variable. This allows embedding phishing links, tracking pixels, and spoofed content inside legitimate support emails sent from the organization's address. Version 1.8.213 fixes the issue.
| CWE | CWE-116 |
| Vendor | freescout-help-desk |
| Product | freescout |
| Published | Apr 21, 2026 |
Stay Ahead of the Next One
Get instant alerts for freescout-help-desk freescout
Be the first to know when new medium vulnerabilities affecting freescout-help-desk freescout are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None
Affected Versions
freescout-help-desk / freescout
< 1.8.213