top of page
perceptive_background_267k.jpg

Froxlor is open source server administration software. Prior to version 2.3.6, `DomainZones::add()` accepts arbitrary DNS record types without a whitelist and d…

Published:

22 April 2026 at 22:00:00

Alert date:

23 April 2026 at 05:01:52

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Network Infrastructure

Froxlor server administration software prior to version 2.3.6 contains a vulnerability in the DomainZones::add() function that accepts arbitrary DNS record types without proper validation. The flaw allows authenticated customers to bypass content validation by submitting DNS types not covered by the validation chain (NAPTR, PTR, HINFO). Newline characters in the content field are not sanitized and survive processing, enabling injection of arbitrary DNS records and BIND directives ($INCLUDE, $ORIGIN, $GENERATE) into domain zone files. The vulnerability is fixed in version 2.3.6.

Technical details

Mitigation steps:

Affected products:

Froxlor

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page