CVE-2026-41231

Froxlor is open source server administration software. Prior to version 2.3.6, `DataDump.add()` constructs the export destination path from user-supplied input without passing the `$fixed_homedir` parameter to `FileDir::makeCorrectDir()`, bypassing the symlink validation that was added to all other customer-facing path operations (likely as the fix for CVE-2023-6069). When the ExportCron runs as root, it executes `chown -R` on the resolved symlink target, allowing a customer to take ownership of arbitrary directories on the system. Version 2.3.6 contains an updated fix.
Configurations

Configuration 1 (hide)

cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:*

History

27 Apr 2026, 17:01

Type Values Removed Values Added
CPE cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:*
References () https://github.com/froxlor/froxlor/commit/2987b0e8806ef12b532410050ad76d13d673a87d - () https://github.com/froxlor/froxlor/commit/2987b0e8806ef12b532410050ad76d13d673a87d - Patch
References () https://github.com/froxlor/froxlor/releases/tag/2.3.6 - () https://github.com/froxlor/froxlor/releases/tag/2.3.6 - Release Notes
References () https://github.com/froxlor/froxlor/security/advisories/GHSA-75h4-c557-j89r - () https://github.com/froxlor/froxlor/security/advisories/GHSA-75h4-c557-j89r - Exploit, Vendor Advisory, Mitigation
First Time Froxlor
Froxlor froxlor

23 Apr 2026, 18:16

Type Values Removed Values Added
References () https://github.com/froxlor/froxlor/security/advisories/GHSA-75h4-c557-j89r - () https://github.com/froxlor/froxlor/security/advisories/GHSA-75h4-c557-j89r -

23 Apr 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 04:16

Updated : 2026-04-27 17:01


NVD link : CVE-2026-41231

Mitre link : CVE-2026-41231

CVE.ORG link : CVE-2026-41231


JSON object : View

Products Affected

froxlor

  • froxlor
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')