Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Tuesday recap

NewsDealsSocialBlogsVideosPodcasts
HomeTechnologyCybersecurityNewsMail2Shell Zero-Click Attack Lets Hackers Hijack FreeScout Mail Servers
Mail2Shell Zero-Click Attack Lets Hackers Hijack FreeScout Mail Servers
CybersecurityEnterpriseDefense

Mail2Shell Zero-Click Attack Lets Hackers Hijack FreeScout Mail Servers

•March 4, 2026
0
BleepingComputer
BleepingComputer•Mar 4, 2026

Companies Mentioned

Shodan

Shodan

Deichman

Deichman

ZEN

GitHub

GitHub

Why It Matters

The vulnerability enables unauthenticated attackers to fully compromise mail servers, exposing sensitive customer data and facilitating lateral movement across networks. Prompt remediation is critical for organizations relying on self‑hosted support solutions.

Key Takeaways

  • •Zero‑click RCE via crafted email attachment.
  • •Exploits Unicode zero‑width space to bypass file validation.
  • •Affects FreeScout up to version 1.8.206; patched in 1.8.207.
  • •Over 1,100 public instances expose the vulnerability.
  • •Immediate patching and Apache config change recommended.

Pulse Analysis

FreeScout has become a popular self‑hosted alternative to commercial ticketing systems, powering thousands of support inboxes worldwide. Its open‑source nature and ease of deployment have driven rapid adoption, but also increased exposure to threat actors scanning for vulnerable instances. The discovery of CVE‑2026‑28289 underscores how even well‑intentioned security patches can be subverted when input sanitization overlooks obscure Unicode characters, turning a routine email into a weapon without any user interaction.

The technical chain begins with a crafted email attachment whose filename is prefixed by a zero‑width space (U+200B). This invisible character slips past the filename filter that blocks dotfiles and restricted extensions, allowing the malicious file to be stored in the server's /storage/attachment directory. Once saved, the file can be accessed via the web interface, enabling the attacker to execute arbitrary commands and achieve full server compromise. The exploit also re‑activates the earlier CVE‑2026‑27636 vulnerability, demonstrating how layered flaws can compound risk when mitigations are incomplete.

For administrators, the immediate steps are clear: upgrade to FreeScout 1.8.207, disable Apache’s AllowOverrideAll directive, and audit all exposed instances for signs of compromise. Beyond the specific fix, the incident highlights the broader challenge of securing open‑source infrastructure—continuous code review, robust input validation, and rapid patch distribution are essential. Organizations should integrate vulnerability scanning tools that detect hidden Unicode exploits and maintain an incident response plan for zero‑click threats, ensuring resilience against evolving attack techniques.

Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...