CVE-2026-28289 – FreeScout – Remote Code Execution and Patch Bypass Vulnerabilities

CVSS 10 CRITICAL

“A simple file upload bug turned into a zero-click server takeover risk for FreeScout deployments.”

A security update addresses two serious vulnerabilities in FreeScout, the open-source help desk and shared inbox platform. The first issue, CVE-2026-27636, allows an authenticated user to upload dangerous configuration files such as .htaccess due to incomplete file extension restrictions in the upload validation logic. On Apache servers with AllowOverride enabled, this can allow attackers to redefine how files are processed and ultimately execute arbitrary code on the server. The CVSS score is 8.8, which is High severity.

A second vulnerability, CVE-2026-28289, bypasses the original patch for the upload restriction flaw. By inserting an invisible zero-width space character before the filename, attackers can bypass the filename validation check and upload a malicious .htaccess file. Researchers demonstrated that this weakness can escalate into unauthenticated remote code execution, allowing attackers to execute commands on the server simply by sending a crafted email to a configured FreeScout mailbox. The CVSS score is 10.0, which is Critical severity.

FreeScout addressed these issues by strengthening file upload validation and sanitization logic in version 1.8.207, which prevents dangerous filenames and blocks the bypass technique that enabled remote code execution.

Key Details

Affected Product
Freescout Freescout
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
CWE Classification
CWE-434
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.