


Perceptive Security
SOC/SIEM Consultancy

Froxlor is open source server administration software. Prior to version 2.3.6, `DomainZones::add()` accepts arbitrary DNS record types without a whitelist and d…
Published:
22 april 2026 om 22:00:00
Alert date:
23 april 2026 om 05:01:52
Source:
nvd.nist.gov
Web Technologies, Network Infrastructure
Froxlor server administration software prior to version 2.3.6 contains a vulnerability in the DomainZones::add() function that accepts arbitrary DNS record types without proper validation. The flaw allows authenticated customers to bypass content validation by submitting DNS types not covered by the validation chain (NAPTR, PTR, HINFO). Newline characters in the content field are not sanitized and survive processing, enabling injection of arbitrary DNS records and BIND directives ($INCLUDE, $ORIGIN, $GENERATE) into domain zone files. The vulnerability is fixed in version 2.3.6.
Technical details
Mitigation steps:
Affected products:
Froxlor
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-41230
https://github.com/froxlor/froxlor/commit/47a8af5d9523cb6ec94567405cfc2e294d3a1442
https://github.com/froxlor/froxlor/releases/tag/2.3.6
https://github.com/froxlor/froxlor/security/advisories/GHSA-47hf-23pw-3m8c
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
