Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-40569 β€” AI Deep Analysis Summary

CVSS 9.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: FreeScout < 1.8.213 suffers from **Mass Assignment** in email connection settings.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-284**: Improper Control of Generation of Code ('Code Injection') / Mass Assignment. πŸ’₯ **Flaw**: `connectionIncomingSave` & `connectionOutgoingSave` pass `$request->all()` directly to `$mailbox->fill`.…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: FreeScout (Laravel PHP Help Desk). πŸ“¦ **Affected**: Versions **before 1.8.213**. βœ… **Safe**: 1.8.213 and later. πŸ“… **Published**: 2026-04-21.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Privileges**: Requires **Authenticated Admin** access. 🎯 **Impact**: Can modify **any fillable field** in the Mailbox model. πŸ“¬ **Specifics**: Inject BCC addresses or hijack SMTP outgoing connections. πŸ”„

Q5Is exploitation threshold high? (Auth/Config)

πŸ”’ **Threshold**: **High** for Auth, **Low** for Execution. πŸ›‘ **PR:H**: Requires High Privileges (Admin). ⚑ **AC:L**: Low Complexity. πŸ–±οΈ **UI:N**: No User Interaction needed once logged in. πŸ“Š **CVSS**: High (8.1+).

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exp**: **No** public PoC or wild exploitation detected yet. πŸ“œ **Status**: POCs list is empty in data. πŸ” **Reference**: GHSA advisory confirms vulnerability but no exploit code shared. πŸ•΅οΈβ€β™‚οΈ

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for FreeScout instances. πŸ“‹ **Verify**: Check version number in footer/config. πŸ› οΈ **Feature**: Look for 'Connection Settings' endpoints.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes! Patched in **v1.8.213**. πŸ”— **Commit**: `f45b9105d43b0352c08fcca154e8ae6177c3d860`. πŸ“₯ **Action**: Upgrade immediately via GitHub releases. πŸš€

Q9What if no patch? (Workaround)

πŸ›‘οΈ **Workaround**: If stuck on old version, **restrict Admin access** strictly. 🚫 **Mitigation**: Implement WAF rules to block mass-assignment payloads on `/connection/save` endpoints.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. πŸ“’ **Priority**: Patch immediately. ⚠️ **Reason**: Admin compromise leads to **data leakage** (BCC) and **service disruption** (SMTP redirect). πŸ“‰ **Risk**: Confidentiality & Integrity hit hard. πŸ›‘οΈ