CVE-2026-40567 PUBLISHED

FreeScout has HTML Injection in Outgoing Emails via Unsanitized Customer Name in Signature Variables

Assigner: GitHub_M
Reserved: 14.04.2026 Published: 21.04.2026 Updated: 21.04.2026

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, an unauthenticated attacker can inject arbitrary HTML into outgoing emails generated by FreeScout by sending an email with a crafted From display name. The name is stored in the database without sanitization and rendered unescaped into outgoing reply emails via the {%customer.fullName%} signature variable. This allows embedding phishing links, tracking pixels, and spoofed content inside legitimate support emails sent from the organization's address. Version 1.8.213 fixes the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
CVSS Score: 5.8

Product Status

Vendor freescout-help-desk
Product freescout
Versions
  • Version < 1.8.213 is affected

References

Problem Types

  • CWE-116: Improper Encoding or Escaping of Output CWE