Home

Description

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, an unauthenticated attacker can access diagnostic and system tools that should be restricted to administrators. The /system/cron endpoint relies on a static MD5 hash derived from the APP_KEY, which is exposed in the response and logs. Accessing these endpoints reveals sensitive server information (Full Path Disclosure), process IDs, and allows for Resource Exhaustion (DoS) by triggering heavy background tasks repeatedly without any rate limiting. The cron hash is generated using md5(APP_KEY . 'web_cron_hash'). Since this hash is often transmitted via GET requests, it is susceptible to exposure in server logs, browser history, and proxy logs. Furthermore, the lack of rate limiting on these endpoints allows for automated resource exhaustion (DoS) and brute-force attempts. Version 1.8.213 fixes the issue.

PUBLISHED Reserved 2026-04-13 | Published 2026-04-21 | Updated 2026-04-21 | Assigner GitHub_M




HIGH: 8.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:P

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CWE-284: Improper Access Control

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 1.8.213
affected

References

github.com/...escout/security/advisories/GHSA-5jw5-q9j7-4rxc exploit

github.com/...escout/security/advisories/GHSA-5jw5-q9j7-4rxc

github.com/...ommit/b1d6c2c601a6ec3626ab13e679607b5084dfbd38

github.com/...scout-help-desk/freescout/releases/tag/1.8.213

cve.org (CVE-2026-40498)

nvd.nist.gov (CVE-2026-40498)

Download JSON