top of page
perceptive_background_267k.jpg

Froxlor is open source server administration software. Prior to version 2.3.6, `PhpHelper::parseArrayToString()` writes string values into single-quoted PHP str…

Published:

22 April 2026 at 22:00:00

Alert date:

23 April 2026 at 05:01:52

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

Froxlor server administration software prior to version 2.3.6 contains a critical PHP code injection vulnerability. The PhpHelper::parseArrayToString() function fails to escape single quotes in string literals. When an admin with change_serversettings permission updates MySQL server settings via API, the privileged_user parameter is written unescaped into lib/userdata.inc.php. This allows arbitrary PHP code injection that executes on every page load as the web server user. The vulnerability affects the core userdata.inc.php file which is required on every request through Database::getDB().

Technical details

Mitigation steps:

Affected products:

Froxlor

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page