Mail2Shell Zero-Click Flaw Puts FreeScout Mail Servers at Risk; Urgent Update Released

Mail2Shell: Critical Zero-Click Vulnerability Exposes FreeScout Mail Servers to Remote Hijacking

In a significant cybersecurity development, researchers have identified a critical zero-click vulnerability in FreeScout, an open-source help desk and shared mailbox application. This flaw, termed Mail2Shell, enables attackers to hijack mail servers without requiring user interaction or authentication.

Understanding the Mail2Shell Vulnerability

The vulnerability, designated as CVE-2026-28289, represents an escalation from a previously patched Remote Code Execution (RCE) flaw (CVE-2026-27636). The initial patch aimed to prevent dangerous file uploads by appending an underscore to files with restricted extensions or names beginning with a period. However, security analysts discovered that this fix could be circumvented by prepending a Zero-Width Space character (Unicode U+200B) to the malicious filename.

This subtle manipulation allows the file to bypass initial security checks, as the system does not recognize the hidden character during validation. Subsequently, the server processes the file, stripping the U+200B character and leaving the payload as a potentially harmful dotfile.

Exploitation Mechanism

To exploit this vulnerability, an attacker sends a crafted email containing the malicious payload to any address associated with the FreeScout server. The system automatically writes the file to disk in a predictable directory (/storage/attachment/…). The attacker can then access the payload via the web interface and execute remote commands instantly. This entire process requires no authentication or interaction from the victim, making it particularly insidious.

Potential Impact

FreeScout is widely used by public health institutions, financial platforms, and technology providers to manage customer support. Built on the Laravel PHP framework, FreeScout has over 1,100 publicly exposed instances, making it an attractive target for threat actors.

If exploited, the Mail2Shell vulnerability can lead to complete server takeover. Attackers can exfiltrate sensitive helpdesk tickets, steal customer inbox data, and use the compromised host to move laterally across the organization’s network.

Immediate Mitigation Measures

In response to this critical vulnerability, FreeScout maintainers have released version 1.8.207 to address the issue. Administrators are strongly urged to apply this update immediately, as the previous patch does not protect against this zero-click escalation.

Conclusion

The discovery of the Mail2Shell vulnerability underscores the importance of continuous vigilance and prompt patching in cybersecurity. Organizations using FreeScout should prioritize updating their systems to mitigate potential risks associated with this flaw.