


Perceptive Security
SOC/SIEM Consultancy

Froxlor is open source server administration software. Prior to version 2.3.6, `PhpHelper::parseArrayToString()` writes string values into single-quoted PHP str…
Published:
22 April 2026 at 22:00:00
Alert date:
23 April 2026 at 05:01:52
Source:
nvd.nist.gov
Web Technologies, Enterprise Applications
Froxlor server administration software prior to version 2.3.6 contains a critical PHP code injection vulnerability. The PhpHelper::parseArrayToString() function fails to escape single quotes in string literals. When an admin with change_serversettings permission updates MySQL server settings via API, the privileged_user parameter is written unescaped into lib/userdata.inc.php. This allows arbitrary PHP code injection that executes on every page load as the web server user. The vulnerability affects the core userdata.inc.php file which is required on every request through Database::getDB().
Technical details
Mitigation steps:
Affected products:
Froxlor
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-41229
https://github.com/froxlor/froxlor/commit/3589ddf93ab59eb2a8971f0f56cbf6266d03c4ae
https://github.com/froxlor/froxlor/releases/tag/2.3.6
https://github.com/froxlor/froxlor/security/advisories/GHSA-gc9w-cc93-rjv8
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
