Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-33mp-8p67-xj7c | Froxlor has Admin-to-Root Privilege Escalation via Input Validation Bypass + OS Command Injection |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:* |
Wed, 04 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Froxlor
Froxlor froxlor |
|
| Vendors & Products |
Froxlor
Froxlor froxlor |
Tue, 03 Mar 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Froxlor is open source server administration software. Prior to 2.3.4, a typo in Froxlor's input validation code (== instead of =) completely disables email format checking for all settings fields declared as email type. This allows an authenticated admin to store arbitrary strings in the panel.adminmail setting. This value is later concatenated into a shell command executed as root by a cron job, where the pipe character | is explicitly whitelisted. The result is full root-level Remote Code Execution. This vulnerability is fixed in 2.3.4. | |
| Title | Froxlor Admin-to-Root Privilege Escalation via Input Validation Bypass + OS Command Injection | |
| Weaknesses | CWE-482 CWE-78 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-04T16:13:18.823Z
Reserved: 2026-02-12T17:10:53.414Z
Link: CVE-2026-26279
Updated: 2026-03-04T16:12:41.946Z
Status : Analyzed
Published: 2026-03-03T23:15:55.223
Modified: 2026-03-05T21:19:02.577
Link: CVE-2026-26279
No data.
OpenCVE Enrichment
Updated: 2026-03-04T14:53:32Z
Github GHSA