PT-2026-34634 · Froxlor · Froxlor
Published
2026-04-23
·
Updated
2026-04-23
·
CVE-2026-41230
CVSS v3.1
8.5
High
| AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L |
Froxlor is open source server administration software. Prior to version 2.3.6,
DomainZones::add() accepts arbitrary DNS record types without a whitelist and does not sanitize newline characters in the content field. When a DNS type not covered by the if/elseif validation chain is submitted (e.g., NAPTR, PTR, HINFO), content validation is entirely bypassed. Embedded newline characters in the content survive trim() processing, are stored in the database, and are written directly into BIND zone files via DnsEntry:: toString(). An authenticated customer can inject arbitrary DNS records and BIND directives ($INCLUDE, $ORIGIN, $GENERATE) into their domain's zone file. Version 2.3.6 fixes the issue.Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Froxlor