CVE-2026-26279

9.1 CRITICAL

📋 TL;DR

A typo in Froxlor's input validation code (== instead of =) disables email format checking for admin email settings. This allows authenticated admins to inject arbitrary strings into a root-level cron job shell command, leading to full remote code execution. All Froxlor installations prior to version 2.3.4 with admin users are affected.

💻 Affected Systems

Products:
  • Froxlor
Versions: All versions prior to 2.3.4
Operating Systems: Linux, Unix-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated admin access. The vulnerability exists in the email validation logic for admin settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full root-level remote code execution on the server, allowing complete system compromise, data theft, and lateral movement.

🟠

Likely Case

Authenticated admin users can execute arbitrary commands as root, potentially leading to server takeover.

🟢

If Mitigated

With proper access controls limiting admin privileges, impact is reduced but still significant if any admin account is compromised.

🌐 Internet-Facing: HIGH - Froxlor panels are typically internet-facing for remote administration.
🏢 Internal Only: MEDIUM - Internal-only deployments reduce attack surface but authenticated admins can still exploit.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated admin access. The vulnerability is straightforward to exploit once admin credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.4

Vendor Advisory: https://github.com/froxlor/Froxlor/security/advisories/GHSA-33mp-8p67-xj7c

Restart Required: No

Instructions:

1. Backup your Froxlor configuration and database. 2. Download Froxlor 2.3.4 from the official releases. 3. Replace existing files with the new version. 4. Run the update script if prompted.

🔧 Temporary Workarounds

Restrict Admin Access

linux

Limit admin panel access to trusted IP addresses only.

# Configure web server (Apache/nginx) to restrict access to Froxlor admin panel
# Example for Apache: Require ip 192.168.1.0/24
# Example for nginx: allow 192.168.1.0/24; deny all;

Monitor Admin Email Changes

linux

Implement monitoring for changes to admin email settings.

# Monitor Froxlor configuration files for changes
# Example: inotifywait -m /var/www/froxlor/ -e modify | grep --line-buffered 'config'

🧯 If You Can't Patch

  • Implement strict access controls and multi-factor authentication for all admin accounts.
  • Monitor and audit all admin activities, particularly changes to email settings and cron job executions.

🔍 How to Verify

Check if Vulnerable:

Check Froxlor version. If version is below 2.3.4, the system is vulnerable.

Check Version:

grep 'version' /var/www/froxlor/lib/version.php | head -1

Verify Fix Applied:

Verify Froxlor version is 2.3.4 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual cron job executions as root
  • Changes to admin email settings in Froxlor logs
  • Shell command execution patterns in system logs

Network Indicators:

  • Unusual outbound connections from Froxlor server
  • Suspicious payloads in HTTP requests to Froxlor admin panel

SIEM Query:

source="froxlor.log" AND ("adminmail" OR "cron" OR "root")

🔗 References

📤 Share & Export