


Perceptive Security
SOC/SIEM Consultancy

Froxlor is open source server administration software. Prior to version 2.3.6, the Froxlor API endpoint `Customers.update` (and `Admins.update`) does not valida…
Published:
22 April 2026 at 22:00:00
Alert date:
23 April 2026 at 05:01:52
Source:
nvd.nist.gov
Web Technologies, Enterprise Applications
Froxlor server administration software versions prior to 2.3.6 contain a path traversal vulnerability in the API endpoints Customers.update and Admins.update. The def_language parameter is not properly validated against available language files, allowing authenticated users to inject path traversal payloads. When Language::loadLanguage() processes these malicious paths, it can lead to arbitrary PHP code execution as the web server user. The vulnerability has been patched in version 2.3.6.
Technical details
Mitigation steps:
Affected products:
Froxlor
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-41228
https://github.com/froxlor/froxlor/commit/bc5e6dbaa90e6f3573129da640595e8c770e1d0c
https://github.com/froxlor/froxlor/releases/tag/2.3.6
https://github.com/froxlor/froxlor/security/advisories/GHSA-w59f-67xm-rxx7
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
