Exploit for CVE-2026-28289

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code Execution (RCE) on the server by uploading a malicious .htaccess file using a zero-width space character prefix to bypass the security check. The vulnerability exists in the sanitizeUploadedFileName() function in app/Http/Helper.php. The function contains a Time-of-Check to Time-of-Use (TOCTOU) flaw where the dot-prefix check occurs before sanitization removes invisible characters. This vulnerability is fixed in 1.8.207.

Published: 2026-03-03

CVSS: 10.0

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Download Exploit for CVE-2026-28289 here:

Use Tor Browser to access .onion site.

https://sonitex.com/exploit-552-cve-2026-25921/

https://sonitex.com/exploit-655-cve-2026-3747/

https://sonitex.com/exploit-734-cve-2026-23813/

https://sonitex.com/exploit-775-cve-2026-32118/

https://sonitex.com/exploit-461-cve-2026-28778/