CVE-2026-27636 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: February 26, 2026
FreeScout - Remote Code Execution
Overview
FreeScout < 1.8.206 contains a remote code execution vulnerability caused by missing file upload restrictions for .htaccess and .user.ini files in app/Misc/Helper.php, letting authenticated users upload malicious files on Apache servers with AllowOverride All.
Severity & Score
Impact
Authenticated users can execute arbitrary code remotely by uploading malicious configuration files, potentially compromising the server.
Mitigation
Upgrade to version 1.8.206 or later.
References
Social Media Activity(1 post)
š“ CVE-2026-28289 - Critical (10) FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code E... š https://www.thehackerwire.com/vulnerability/CVE-2026-28289/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postGitHub Repositories(1 repo)
Related Resources
Details
- CVE ID
- CVE-2026-27636
- Severity
- High
- CVSS Score
- 8.8
- Type
- unrestricted_file_upload
- Status
- confirmed
- EPSS
- 34.1%
- Social Posts
- 1
CWE
- CWE-434
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H