LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-27636

CVE-2026-27636 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: February 26, 2026

FreeScout - Remote Code Execution

Published: February 25, 2026Updated: February 26, 2026PoC AvailableRemote Exploitable

Overview

FreeScout < 1.8.206 contains a remote code execution vulnerability caused by missing file upload restrictions for .htaccess and .user.ini files in app/Misc/Helper.php, letting authenticated users upload malicious files on Apache servers with AllowOverride All.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 34.1%(Probability of exploitation in next 30 days)

Impact

Authenticated users can execute arbitrary code remotely by uploading malicious configuration files, potentially compromising the server.

Mitigation

Upgrade to version 1.8.206 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 4, 2026

šŸ”“ CVE-2026-28289 - Critical (10) FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code E... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-28289/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-27636
Severity
High
CVSS Score
8.8
Type
unrestricted_file_upload
Status
confirmed
EPSS
34.1%
Social Posts
1

CWE

  • CWE-434

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

34.1%Probability of exploitation in the next 30 days