Cyber Posture

CVE-2026-27636

HighPublic PoC

Published: 25 February 2026

Published
25 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.2242 95.9th percentile
Risk Priority 31 60% EPSS · 20% KEV · 20% CVSS

Description

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.206, FreeScout's file upload restriction list in `app/Misc/Helper.php` does not include `.htaccess` or `.user.ini` files. On Apache servers with `AllowOverride All` (a common…

more

configuration), an authenticated user can upload a `.htaccess` file to redefine how files are processed, enabling Remote Code Execution. This vulnerability can be exploited on its own or in combination with CVE-2026-27637. Version 1.8.206 fixes both vulnerabilities.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces restrictions on file upload inputs by blocking dangerous types like .htaccess and .user.ini omitted from FreeScout's restriction list.

prevent

Implements input validation mechanisms at file upload points to reject unrestricted uploads of server configuration files enabling RCE.

prevent

Requires timely remediation of the specific application flaw via patching, as done in FreeScout 1.8.206 to update the upload blacklist.

Security SummaryAI

CVE-2026-27636 is an unrestricted upload vulnerability in FreeScout, an open-source help desk and shared inbox application built on PHP's Laravel framework. In versions prior to 1.8.206, the file upload restriction list implemented in `app/Misc/Helper.php` fails to block `.htaccess` or `.user.ini` files. This allows authenticated users to upload such files to directories on Apache web servers configured with `AllowOverride All`, a common default setting, enabling attackers to override server configurations for malicious purposes. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type).

An authenticated user with low privileges, such as a standard help desk ticket submitter, can exploit this remotely over the network with low complexity and no user interaction required. By uploading a crafted `.htaccess` file, the attacker redefines how Apache processes subsequent files, leading to remote code execution (RCE) on the server. This can occur independently or in combination with CVE-2026-27637, potentially granting full server compromise including data exfiltration, privilege escalation, or further lateral movement.

The FreeScout project addressed this in version 1.8.206 by updating the file upload restrictions in `app/Misc/Helper.php` to explicitly block `.htaccess` and `.user.ini` files, as detailed in the project's GitHub security advisories (GHSA-6gcm-v8xf-j9v9 and GHSA-mw88-x7j3-74vc) and the fixing commit (9984071e6f1b4e633fdcffcea82bbebc9c1e009c). Security practitioners should upgrade to 1.8.206 or later, review Apache configurations to limit `AllowOverride` where possible, and audit file upload directories for unauthorized `.htaccess` files.

Details

CWE(s)

Affected Products

freescout
freescout
≤ 1.8.206

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unrestricted file upload vulnerability in public-facing web application (FreeScout) enables authenticated attackers to upload .htaccess files for remote code execution by overriding Apache configurations.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References