CVE Vulnerabilities

CVE-2026-27637

Use of Insufficiently Random Values

Published: Feb 25, 2026 | Modified: Feb 26, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

FreeScout is a free help desk and shared inbox built with PHPs Laravel framework. Prior to version 1.8.206, FreeScouts TokenAuth middleware uses a predictable authentication token computed as MD5(user_id + created_at + APP_KEY). This token is static (never expires/rotates), and if an attacker obtains the APP_KEY — a well-documented and common exposure vector in Laravel applications — they can compute a valid token for any user, including the administrator, achieving full account takeover without any password. This vulnerability can be exploited on its own or in combination with CVE-2026-27636. Version 1.8.206 fixes both vulnerabilities.

Weakness

The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.

Affected Software

NameVendorStart VersionEnd Version
FreescoutFreescout*1.8.206 (excluding)

Potential Mitigations

  • Use a well-vetted algorithm that is currently considered to be strong by experts in the field, and select well-tested implementations with adequate length seeds.
  • In general, if a pseudo-random number generator is not advertised as being cryptographically secure, then it is probably a statistical PRNG and should not be used in security-sensitive contexts.
  • Pseudo-random number generators can produce predictable numbers if the generator is known and the seed can be guessed. A 256-bit seed is a good starting point for producing a “random enough” number.

References