PT-2026-22840 · Froxlor · Froxlor
Moonster8282
·
Published
2026-03-03
·
Updated
2026-03-23
·
CVE-2026-26279
CVSS v3.1
9.1
Critical
| AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Froxlor versions prior to 2.3.4
Description
Froxlor is open source server administration software. A flaw in the input validation code, specifically a typo where '==' was used instead of '=', disables email format checking for settings fields declared as email type. This allows an authenticated administrator to store arbitrary strings in the
panel.adminmail setting. This value is then used in a shell command executed as root by a cron job, where the pipe character '|' is explicitly whitelisted, leading to remote code execution.Recommendations
Upgrade to version 2.3.4 to address this issue.
Fix
RCE
LPE
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Froxlor