Cyber Posture

CVE-2026-32754

CriticalPublic PoC

Published: 19 March 2026

Published
19 March 2026
Modified
23 March 2026
KEV Added
Patch
CVSS Score 9.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0008 23.3th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32754 is a critical-severity Cross-site Scripting (CWE-79) vulnerability in Freescout Freescout. Its CVSS base score is 9.3 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates filtering unsanitized email bodies when rendering them in outgoing notifications to prevent stored XSS execution.

prevent

Requires validation and sanitization of incoming email bodies before database storage to neutralize XSS payloads from unauthenticated attackers.

prevent

Ensures timely identification and patching of flaws like unescaped output in Blade templates, as fixed in FreeScout 1.8.209.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Stored XSS in public-facing helpdesk app (FreeScout) directly enables remote unauthenticated exploitation via email input (T1190); injected payload executes as JavaScript in recipient contexts (T1059.007) and facilitates browser/email-client session hijacking or credential theft (T1185).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Versions 1.8.208 and below are vulnerable to Stored Cross-Site Scripting (XSS) through FreeScout's email notification templates. Incoming email bodies are stored in the database without sanitization…

more

and rendered unescaped in outgoing email notifications using Blade's raw output syntax {!! $thread->body !!}. An unauthenticated attacker can exploit this vulnerability by simply sending an email, and when opened by any subscribed agent or admin as part of their normal workflow, enabling universal HTML injection (phishing, tracking) and, in vulnerable email clients, JavaScript execution (session hijacking, credential theft, account takeover) affecting all recipients simultaneously. This issue has been fixed in version 1.8.209.

Deeper analysisAI

CVE-2026-32754 is a stored cross-site scripting (XSS) vulnerability affecting FreeScout, an open-source help desk and shared inbox application built on PHP's Laravel framework. Versions 1.8.208 and prior are vulnerable due to incoming email bodies being stored in the database without sanitization and subsequently rendered unescaped in outgoing email notifications using Laravel Blade's raw output syntax {!! $thread->body !!}. This flaw, associated with CWE-79 (Improper Neutralization of Input During Web Page Generation) and CWE-116 (Improper Encoding or Escaping of Output), carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N).

An unauthenticated attacker can exploit this vulnerability by sending a malicious email to the FreeScout instance. When any subscribed agent or administrator opens the resulting notification email as part of their normal workflow, the unsanitized content triggers universal HTML injection across all recipients, enabling phishing or tracking. In email clients vulnerable to JavaScript execution, this escalates to session hijacking, credential theft, or account takeover, impacting all notification recipients simultaneously.

The issue has been addressed in FreeScout version 1.8.209, as detailed in the project's security advisory (GHSA-56h2-5556-r6mg), release notes, and the fixing commit (3329379db38a86cf7069b0709061b95a7d38985b). Security practitioners should upgrade to 1.8.209 or later and review notification templates for similar raw output usage.

Details

CWE(s)

Affected Products

freescout
freescout
≤ 1.8.209

CVEs Like This One

CVE-2026-40497Same product: Freescout Freescout
CVE-2025-54366Same product: Freescout Freescout
CVE-2026-28289Same product: Freescout Freescout
CVE-2026-27636Same product: Freescout Freescout
CVE-2026-40496Same product: Freescout Freescout
CVE-2026-39384Same product: Freescout Freescout
CVE-2025-58163Same product: Freescout Freescout
CVE-2026-27637Same product: Freescout Freescout
CVE-2026-40498Same product: Freescout Freescout
CVE-2026-32752Same product: Freescout Freescout

References