FreeScout recently addressed a critical zero-click remote code execution (RCE) vulnerability, known as “Mail2Shell” (CVE-2024-43358), which allowed attackers to take over servers without authentication or user interaction. This significant security flaw impacted thousands of businesses using the open-source help desk solution, leveraging how FreeScout processes incoming emails to deploy malicious payloads.
The Mail2Shell vulnerability is particularly dangerous because it bypasses traditional security measures, including user awareness training and email filtering, by exploiting how FreeScout processes incoming emails [2]. Its nature as an unauthenticated zero-click attack, coupled with the potential for full server compromise, highlights the severe threat it posed to organizations utilizing vulnerable FreeScout installations [1, 3].
Technical Anatomy of the Mail2Shell Exploit
The Mail2Shell vulnerability leverages FreeScout’s email processing mechanism to facilitate unauthorized code execution on the server [2]. Attackers initiate the exploit by sending a specially crafted malicious email to any mailbox monitored by a vulnerable FreeScout instance [1, 3]. The system then processes this message, inadvertently writing the malicious payload directly to the server’s disk [3].
The Zero-Click Mechanism
This attack is classified as “zero-click” because it requires no interaction from the victim, such as clicking a link or opening an attachment [1, 2]. Instead, the act of the FreeScout software receiving and processing the malicious email is sufficient to trigger the initial compromise [3]. This bypasses common security barriers that rely on user vigilance [2].
Predictable Payload Storage
A critical aspect of the Mail2Shell vulnerability lies in the predictability of file storage locations on the FreeScout server [3]. Attackers can accurately determine where their malicious payload will be saved after the system processes the email [3]. Once the payload is on disk, the attacker can navigate to its location via the web interface and execute remote commands instantly, leading to server compromise [1, 3]. OX Security researchers have indicated that successful exploitation can lead to a complete takeover of the server [1].
Patch Bypass and Vulnerability Evolution
The Mail2Shell vulnerability (CVE-2024-43358) emerged as a critical bypass of a previously addressed Remote Code Execution (RCE) flaw in FreeScout, demonstrating the persistent challenge of comprehensive security [1, 3]. This new vulnerability escalated the prior issue into an unauthenticated zero-click attack, demonstrating the iterative nature of security exploits [1].
Previous Vulnerability and Mitigation Attempts
Just days before the discovery of Mail2Shell, FreeScout had patched an authenticated RCE vulnerability, tracked as CVE-2026-27636 [1, 3]. The original patch for CVE-2026-27636 aimed to block dangerous file uploads by appending an underscore to files with restricted extensions or names beginning with a period [1]. This measure was intended to prevent the execution of potentially harmful files.
The Bypass Method
Security analysts, including Stefan Schiller of SonarSource who is credited with discovering the Mail2Shell flaw, found a method to circumvent this initial, incomplete fix [1]. While the specific technical details of how the original security controls were bypassed have not been fully disclosed, likely to prevent further weaponization, the new flaw is described as CVE-2026-28289, which effectively bypasses CVE-2026-27636 [1, 3]. This bypass allows the malicious payload to be saved and subsequently executed despite the previous patch [1, 3]. The relationship between CVE-2026-28289 and the earlier CVE-2026-27636 is considered somewhat opaque by researchers, emphasizing the complexity of this evolving threat [3].
Scope of Impact and Risk Assessment
According to security experts, the Mail2Shell vulnerability carries a maximum CVSS score of 10.0, reflecting its severe potential for damage and ease of exploitation [3]. This critical rating underscores the immediate and extensive risks posed to organizations using vulnerable FreeScout installations.
Severity and Attack Vector
The vulnerability’s classification is based on several critical factors [3]. The attack vector is network-based, meaning it requires no local access to target systems [3]. Its attack complexity is rated as low, indicating that exploitation does not necessitate specialized knowledge or complex multi-step procedures [3]. Crucially, the Mail2Shell flaw requires no privileges and no user interaction, yet it provides a complete impact on system confidentiality, integrity, and availability [3]. Once exploited, attackers gain full control over the mail server, which could lead to significant data theft, widespread system compromise, or further network infiltration [2]. This effectively transforms FreeScout servers into a potential gateway for broader network attacks [2].
Affected Deployments
The Mail2Shell vulnerability specifically targets FreeScout version 1.8.206 installations [3]. Furthermore, it particularly impacts systems running on Apache web servers with the AllowOverride All configuration enabled [3]. FreeScout maintainers have noted that this Apache configuration is commonly implemented across various hosting environments, indicating that a significant portion of real-world deployments could be susceptible to this attack [3]. The widespread use of FreeScout as an open-source help desk solution means that thousands of businesses could be affected by this critical flaw [2, 3].
Mitigation and Recommended Actions
To counter the critical Mail2Shell vulnerability, FreeScout has released an updated version that addresses the security flaw, requiring immediate action from administrators to protect their systems.
Immediate Remediation
Users must upgrade their FreeScout installations to version 1.8.140 to mitigate the risk associated with Mail2Shell [1]. This version was released specifically to patch the security hole and prevent exploitation [1]. Given the unauthenticated and zero-click nature of the attack, prompt patching is essential to prevent unauthorized server takeover [1, 2]. Organizations should prioritize this upgrade as soon as possible to minimize their exposure to this critical threat.
Broader Security Considerations
Beyond immediate patching, organizations should review their overall security posture, particularly concerning email processing systems and web server configurations. Regularly auditing Apache web server configurations to ensure that AllowOverride All is only enabled where strictly necessary can reduce the attack surface [3]. Additionally, implementing robust network segmentation and intrusion detection systems can help detect and contain potential breaches, even if a vulnerability is exploited before a patch can be applied. Continuous security monitoring and timely application of all software updates are crucial practices for maintaining a strong defense against evolving threats.
Expert Perspectives and Discovery
The discovery and analysis of the Mail2Shell vulnerability underscore the continuous efforts of security researchers in identifying and addressing critical flaws in widely used software. Stefan Schiller of SonarSource is credited with identifying this particular RCE flaw during a security analysis [1].
Researchers at OX Security further highlighted the severity of the Mail2Shell vulnerability, emphasizing that if exploited, it could lead to complete server takeover [1]. Their analysis has been instrumental in raising awareness about the zero-click, unauthenticated nature of the attack, which makes it particularly insidious [1]. The rapid identification of this patch bypass, following closely after the initial CVE-2026-27636 fix, illustrates the persistent challenge of comprehensive security and the need for thorough validation of patches [1, 3]. This ongoing cycle of discovery and remediation is a testament to the dynamic landscape of cybersecurity.
The Mail2Shell vulnerability in FreeScout represents a severe threat due to its unauthenticated, zero-click remote code execution capabilities and high CVSS score of 10.0 [1, 3]. Its ability to bypass a previous patch further highlights the sophistication of modern attack techniques [1]. Organizations utilizing FreeScout are strongly urged to upgrade to version 1.8.140 immediately to protect their systems from potential server compromise and broader network attacks [1, 2]. Proactive security measures, including regular updates and configuration reviews, remain paramount in safeguarding digital infrastructure.
Frequently Asked Questions
What is the Mail2Shell vulnerability?
Mail2Shell (CVE-2024-43358) is a critical zero-click remote code execution (RCE) vulnerability found in FreeScout, an open-source help desk solution. It allows attackers to achieve complete server takeover without needing authentication or any user interaction, by exploiting how FreeScout processes incoming emails [1, 3].
What makes Mail2Shell a “zero-click” attack?
A “zero-click” attack means the victim does not need to perform any action, such as clicking a link or opening an attachment, for the exploit to succeed [1, 2]. In the case of Mail2Shell, the mere act of a vulnerable FreeScout instance receiving and processing a specially crafted malicious email is enough to trigger the initial compromise [3].
Which FreeScout versions are affected by Mail2Shell?
The Mail2Shell vulnerability specifically targets FreeScout version 1.8.206 installations [3]. It also particularly impacts systems running on Apache web servers with the AllowOverride All configuration enabled, which is a common setup [3].
How can organizations mitigate the Mail2Shell vulnerability?
To mitigate the Mail2Shell vulnerability, organizations must immediately upgrade their FreeScout installations to version 1.8.140 [1]. Additionally, it’s recommended to review web server configurations, ensuring AllowOverride All is only enabled when strictly necessary, and to implement continuous security monitoring [3].






