CVE-2026-41902
FreeScout · FreeScout
FreeScout contains a flaw in the user-setup endpoint where invite hashes do not expire, allowing unauthenticated attackers to perform permanent account takeovers.
Executive summary
A critical vulnerability in FreeScout enables unauthenticated account takeover due to improper expiration controls on user invitation hashes.
Vulnerability
The /user-setup/{hash} endpoint fails to invalidate invite hashes, allowing them to remain valid indefinitely. An unauthenticated attacker can exploit this via leaked hashes to gain unauthorized access, including administrative privileges if the target account is an admin.
Business impact
This vulnerability carries a 9.1 CVSS score, reflecting the ease of account takeover and the potential for full administrative compromise. Successful exploitation could lead to unauthorized access to sensitive help desk data, customer communications, and internal workflows, resulting in significant reputational and data privacy risks.
Remediation
Immediate Action: Upgrade FreeScout to version 1.8.217 or later immediately to enforce proper hash expiration and lifecycle management.
Proactive Monitoring: Audit existing user accounts for suspicious activity and review access logs for unexpected logins originating from the user-setup endpoint.
Compensating Controls: Ensure that invitation emails are not forwarded or stored in insecure locations and implement multi-factor authentication (MFA) to prevent unauthorized account access.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
The risk of permanent account takeover is severe. Administrators must prioritize updating to version 1.8.217 to ensure that invitation hashes are properly invalidated and to secure the administrative interface against unauthorized access.