Froxlor is open source server administration software. Prior to 2.3.4, a typo in Froxlor's input validation code (== instead of =) completely disables email format checking for all settings fields declared as email type. This allows an authenticated admin to store arbitrary strings in the panel.adminmail setting. This value is later concatenated into a shell command executed as root by a cron job, where the pipe character | is explicitly whitelisted. The result is full root-level Remote Code Execution. This vulnerability is fixed in 2.3.4.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Froxlor
Froxlor froxlor |
|
| Vendors & Products |
Froxlor
Froxlor froxlor |
Tue, 03 Mar 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Froxlor is open source server administration software. Prior to 2.3.4, a typo in Froxlor's input validation code (== instead of =) completely disables email format checking for all settings fields declared as email type. This allows an authenticated admin to store arbitrary strings in the panel.adminmail setting. This value is later concatenated into a shell command executed as root by a cron job, where the pipe character | is explicitly whitelisted. The result is full root-level Remote Code Execution. This vulnerability is fixed in 2.3.4. | |
| Title | Froxlor Admin-to-Root Privilege Escalation via Input Validation Bypass + OS Command Injection | |
| Weaknesses | CWE-482 CWE-78 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-03T22:31:58.516Z
Updated: 2026-03-04T16:13:18.823Z
Reserved: 2026-02-12T17:10:53.414Z
Link: CVE-2026-26279
Updated: 2026-03-04T16:12:41.946Z
Status : Awaiting Analysis
Published: 2026-03-03T23:15:55.223
Modified: 2026-03-04T18:08:05.730
Link: CVE-2026-26279
No data.