Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freescout
Freescout freescout |
|
| CPEs | cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Freescout
Freescout freescout |
Fri, 20 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freescout Helpdesk
Freescout Helpdesk freescout |
|
| Vendors & Products |
Freescout Helpdesk
Freescout Helpdesk freescout |
Thu, 19 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. In versions 1.8.208 and below, the ThreadPolicy::edit() method contains a broken access control vulnerability that allows any authenticated user (regardless of role or mailbox access) to read and modify all customer-created thread messages across all mailboxes. This flaw enables silent modification of customer messages (evidence tampering), bypasses the entire mailbox permission model, and constitutes a GDPR/compliance violation. The issue has been fixed in version 1.8.209. | |
| Title | FreeScout: Broken Access Control in ThreadPolicy — Any User Can Read/Edit All Customer Messages | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T18:10:32.968Z
Reserved: 2026-03-13T18:53:03.532Z
Link: CVE-2026-32752
Updated: 2026-03-20T17:02:45.467Z
Status : Analyzed
Published: 2026-03-19T22:16:41.650
Modified: 2026-03-23T19:30:28.227
Link: CVE-2026-32752
No data.
OpenCVE Enrichment
Updated: 2026-03-25T11:54:44Z