{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T14:15:13.424","vulnerabilities":[{"cve":{"id":"CVE-2026-27636","sourceIdentifier":"security-advisories@github.com","published":"2026-02-25T04:16:03.933","lastModified":"2026-02-26T16:07:11.047","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.206, FreeScout's file upload restriction list in `app/Misc/Helper.php` does not include `.htaccess` or `.user.ini` files. On Apache servers with `AllowOverride All` (a common configuration), an authenticated user can upload a `.htaccess` file to redefine how files are processed, enabling Remote Code Execution. This vulnerability can be exploited on its own or in combination with CVE-2026-27637. Version 1.8.206 fixes both vulnerabilities."},{"lang":"es","value":"FreeScout es un servicio de asistencia técnica gratuito y un buzón compartido creado con el marco Laravel de PHP. Antes de la versión 1.8.206, la lista de restricción de carga de archivos de FreeScout en 'app/Misc/Helper.php' no incluye archivos '.htaccess' o '.user.ini'. En servidores Apache con 'AllowOverride All' (una configuración común), un usuario autenticado puede cargar un archivo '.htaccess' para redefinir cómo se procesan los archivos, habilitando la Ejecución Remota de Código. Esta vulnerabilidad puede ser explotada por sí misma o en combinación con CVE-2026-27637. La versión 1.8.206 corrige ambas vulnerabilidades."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*","versionEndExcluding":"1.8.206","matchCriteriaId":"79CA8F5D-FF18-4F10-A6AF-3DBED9542088"}]}]}],"references":[{"url":"https://github.com/freescout-help-desk/freescout/commit/9984071e6f1b4e633fdcffcea82bbebc9c1e009c","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-6gcm-v8xf-j9v9","source":"security-advisories@github.com","tags":["Not Applicable"]},{"url":"https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-mw88-x7j3-74vc","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-6gcm-v8xf-j9v9","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Not Applicable"]},{"url":"https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-mw88-x7j3-74vc","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}