CVE-2026-41192 PUBLISHED

FreeScout's client-controlled attachment IDs allow deletion of existing conversation attachments

Assigner: GitHub_M
Reserved: 18.04.2026 Published: 21.04.2026 Updated: 21.04.2026

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.215, the reply and draft flows trust client-supplied encrypted attachment IDs. Any IDs present in attachments_all[] but omitted from retained lists are decrypted and passed directly to Attachment::deleteByIds(). Because load_attachments returns encrypted IDs for attachments on a visible conversation, a mailbox peer can replay those IDs through save_draft and delete the original attachment row and file. Version 1.8.215 fixes the vulnerability.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
CVSS Score: 7.1

Product Status

Vendor freescout-help-desk
Product freescout
Versions
  • Version < 1.8.215 is affected

References

Problem Types

  • CWE-862: Missing Authorization CWE