top of page
perceptive_background_267k.jpg

Froxlor is open source server administration software. Prior to version 2.3.6, `DataDump.add()` constructs the export destination path from user-supplied input …

Published:

22 April 2026 at 22:00:00

Alert date:

23 April 2026 at 05:01:52

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

Froxlor server administration software contains a privilege escalation vulnerability prior to version 2.3.6. The DataDump.add() function constructs export destination paths from user input without proper symlink validation, bypassing security controls added for CVE-2023-6069. When ExportCron runs as root, it executes 'chown -R' on resolved symlink targets, allowing customers to take ownership of arbitrary system directories. This represents a complete system compromise scenario where unprivileged users can escalate to root-level access through symlink manipulation.

Technical details

Mitigation steps:

Affected products:

Froxlor

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page