Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-28289 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A TOCTOU flaw in `sanitizeUploadedFileName` allows malicious file uploads. πŸ’₯ **Consequences**: Remote Code Execution (RCE) via `.htaccess` files.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-434** (Unrestricted Upload of File with Dangerous Type). The sanitization logic has a **Time-of-Check to Time-of-Use (TOCTOU)** race condition, failing to block dangerous extensions effectively.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **FreeScout** (PHP/Laravel Help Desk). Versions **1.8.206 and earlier**. Vendor: `freescout-help-desk`.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Authenticated users with **file upload permissions** can upload `.htaccess` files. This leads to **RCE**, granting full control over the server environment.

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: **Low**. CVSS indicates **No Privileges Required** for network access, but the description notes 'authenticated users'.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exploit**: **No PoC** currently listed in the data. However, the vulnerability type (TOCTOU + Upload) is well-understood. Wild exploitation risk increases as details become public.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for **FreeScout** instances. Check if version is **≀ 1.8.206**. Verify if file upload features are enabled and if `.htaccess` files can be uploaded via the web interface.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **Yes**. Patch available via GitHub Advisory **GHSA-5gpc-65p8-ffwp** and commit **f7bc16c56a6b13c06da52ad51fd666546b40818f**. Update immediately.

Q9What if no patch? (Workaround)

πŸ›‘ **No Patch Workaround**: **Disable file uploads** entirely if not needed. Implement strict **WAF rules** to block `.htaccess` uploads. Restrict upload permissions to trusted admins only.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. CVSS Score is **High** (likely 9.0+ based on vector). RCE via upload is a high-impact vector. **Patch immediately** upon availability.