TROYANOSYVIRUS
Back to CVEs

CVE-2026-26279

CRITICAL
9.1

Description

Froxlor is open source server administration software. Prior to 2.3.4, a typo in Froxlor's input validation code (== instead of =) completely disables email format checking for all settings fields declared as email type. This allows an authenticated admin to store arbitrary strings in the panel.adminmail setting. This value is later concatenated into a shell command executed as root by a cron job, where the pipe character | is explicitly whitelisted. The result is full root-level Remote Code Execution. This vulnerability is fixed in 2.3.4.

CVE Details

CVSS v3.1 Score9.1
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published3/3/2026
Last Modified3/5/2026
Sourcenvd
Honeypot Sightings0

Affected Products

froxlor:froxlor

Weaknesses (CWE)

CWE-78CWE-482

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.