


Perceptive Security
SOC/SIEM Consultancy

Froxlor is open source server administration software. Prior to version 2.3.6, `DataDump.add()` constructs the export destination path from user-supplied input …
Published:
22 april 2026 om 22:00:00
Alert date:
23 april 2026 om 05:01:52
Source:
nvd.nist.gov
Web Technologies, Enterprise Applications
Froxlor server administration software contains a privilege escalation vulnerability prior to version 2.3.6. The DataDump.add() function constructs export destination paths from user input without proper symlink validation, bypassing security controls added for CVE-2023-6069. When ExportCron runs as root, it executes 'chown -R' on resolved symlink targets, allowing customers to take ownership of arbitrary system directories. This represents a complete system compromise scenario where unprivileged users can escalate to root-level access through symlink manipulation.
Technical details
Mitigation steps:
Affected products:
Froxlor
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-41231
https://github.com/froxlor/froxlor/commit/2987b0e8806ef12b532410050ad76d13d673a87d
https://github.com/froxlor/froxlor/releases/tag/2.3.6
https://github.com/froxlor/froxlor/security/advisories/GHSA-75h4-c557-j89r
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
