PT-2026-34633 · Froxlor · Froxlor
Published
2026-04-23
·
Updated
2026-04-23
·
CVE-2026-41229
CVSS v3.1
9.1
Critical
| AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Froxlor is open source server administration software. Prior to version 2.3.6,
PhpHelper::parseArrayToString() writes string values into single-quoted PHP string literals without escaping single quotes. When an admin with change serversettings permission adds or updates a MySQL server via the API, the privileged user parameter (which has no input validation) is written unescaped into lib/userdata.inc.php. Since this file is required on every request via Database::getDB(), an attacker can inject arbitrary PHP code that executes as the web server user on every subsequent page load. Version 2.3.6 contains a patch.Fix
Code Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Froxlor