Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-26279
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-03 Mar, 2026 | 22:31
Updated At-03 Mar, 2026 | 22:31
Rejected At-
▼CVE Numbering Authority (CNA)
Froxlor Admin-to-Root Privilege Escalation via Input Validation Bypass + OS Command Injection

Froxlor is open source server administration software. Prior to 2.3.4, a typo in Froxlor's input validation code (== instead of =) completely disables email format checking for all settings fields declared as email type. This allows an authenticated admin to store arbitrary strings in the panel.adminmail setting. This value is later concatenated into a shell command executed as root by a cron job, where the pipe character | is explicitly whitelisted. The result is full root-level Remote Code Execution. This vulnerability is fixed in 2.3.4.

Affected Products
Vendor
froxlor
Product
Froxlor
Versions
Affected
  • < 2.3.4
Problem Types
TypeCWE IDDescription
CWECWE-78CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWECWE-482CWE-482: Comparing instead of Assigning
Type: CWE
CWE ID: CWE-78
Description: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Type: CWE
CWE ID: CWE-482
Description: CWE-482: Comparing instead of Assigning
Metrics
VersionBase scoreBase severityVector
3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/froxlor/Froxlor/security/advisories/GHSA-33mp-8p67-xj7c
x_refsource_CONFIRM
https://github.com/froxlor/froxlor/commit/22249677107f8f39f8d4a238605641e87dab4343
x_refsource_MISC
https://github.com/froxlor/froxlor/releases/tag/2.3.4
x_refsource_MISC
Hyperlink: https://github.com/froxlor/Froxlor/security/advisories/GHSA-33mp-8p67-xj7c
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/froxlor/froxlor/commit/22249677107f8f39f8d4a238605641e87dab4343
Resource:
x_refsource_MISC
Hyperlink: https://github.com/froxlor/froxlor/releases/tag/2.3.4
Resource:
x_refsource_MISC
Details not found