Froxlor is open source server administration software. Prior to version 2.3.5, the DomainZones.add API endpoint (accessible to customers with DNS enabled) does not validate the content field for several DNS record types (LOC, RP, SSHFP, TLSA). An attacker can inject newlines and BIND zone file directives (e.g. $INCLUDE) into the zone file that gets written to disk when the DNS rebuild cron job runs. This issue has been patched in version 2.3.5.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x6w6-2xwp-3jh6 Froxlor is vulnerable to BIND zone file injection via unsanitized DNS record content in DomainZones API
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 24 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Froxlor is open source server administration software. Prior to version 2.3.5, the DomainZones.add API endpoint (accessible to customers with DNS enabled) does not validate the content field for several DNS record types (LOC, RP, SSHFP, TLSA). An attacker can inject newlines and BIND zone file directives (e.g. $INCLUDE) into the zone file that gets written to disk when the DNS rebuild cron job runs. This issue has been patched in version 2.3.5.
Title Froxlor is vulnerable to BIND zone file injection via unsanitized DNS record content in DomainZones API
Weaknesses CWE-74
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T18:46:13.137Z

Reserved: 2026-03-07T16:40:05.885Z

Link: CVE-2026-30932

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-24T19:16:51.863

Modified: 2026-03-24T19:16:51.863

Link: CVE-2026-30932

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses