CVE-2026-27637
📋 TL;DR
FreeScout's authentication system uses a predictable, static token that never expires. If an attacker obtains the Laravel APP_KEY (commonly exposed), they can generate valid authentication tokens for any user, including administrators, leading to full account takeover. All FreeScout installations prior to version 1.8.206 are affected.
💻 Affected Systems
- FreeScout Help Desk
📦 What is this software?
Freescout by Freescout
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of all user accounts including administrators, allowing data theft, system manipulation, and potential lateral movement to connected systems.
Likely Case
Administrative account takeover leading to unauthorized access to sensitive customer data, configuration changes, and potential privilege escalation.
If Mitigated
Limited impact if APP_KEY is properly secured and system is isolated, though vulnerability remains present in code.
🎯 Exploit Status
Exploitation requires APP_KEY access, but token generation is trivial once key is obtained. Often combined with CVE-2026-27636 for easier APP_KEY extraction.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.8.206
Vendor Advisory: https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-6gcm-v8xf-j9v9
Restart Required: Yes
Instructions:
1. Backup your FreeScout installation and database. 2. Update to version 1.8.206 via git pull or package update. 3. Run 'php artisan migrate' to apply database changes. 4. Restart web server and queue workers. 5. Regenerate APP_KEY if previously exposed.
🔧 Temporary Workarounds
Secure APP_KEY
linuxEnsure APP_KEY is not exposed in environment files, logs, or error messages
chmod 600 .env
grep -r 'APP_KEY' /var/log/ --include='*.log'
php artisan key:generate
Network Isolation
linuxRestrict access to FreeScout administration interface
iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_ip -j ACCEPT
🧯 If You Can't Patch
- Immediately regenerate APP_KEY using 'php artisan key:generate' and update all references
- Implement IP-based access controls to restrict administrative interface access to trusted networks only
🔍 How to Verify
Check if Vulnerable:
Check FreeScout version in admin panel or run: grep "'version'" app/Modules/Core/Config/config.php
Check Version:
grep "'version'" app/Modules/Core/Config/config.php
Verify Fix Applied:
Confirm version is 1.8.206 or higher and check that TokenAuth middleware no longer uses MD5(user_id + created_at + APP_KEY)
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authentication attempts followed by successful login from unusual IP
- APP_KEY appearing in error logs or debug output
- Unauthorized access to admin functions
Network Indicators:
- Unusual authentication patterns, especially token-based auth from new locations
- Requests to token generation endpoints from untrusted sources
SIEM Query:
source="freescout.log" AND ("APP_KEY" OR "authentication token" OR "admin login") AND status=200
🔗 References
- https://github.com/freescout-help-desk/freescout/commit/004a8231f6e413af1d4680930b0e2342fd4283f9
- https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-6gcm-v8xf-j9v9
- https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-mw88-x7j3-74vc
- https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-6gcm-v8xf-j9v9
- https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-mw88-x7j3-74vc