← Volver a CVEs
CVE-2026-41228
CRITICAL9.9
Descripcion
Froxlor is open source server administration software. Prior to version 2.3.6, the Froxlor API endpoint `Customers.update` (and `Admins.update`) does not validate the `def_language` parameter against the list of available language files. An authenticated customer can set `def_language` to a path traversal payload (e.g., `../../../../../var/customers/webs/customer1/evil`), which is stored in the database. On subsequent requests, `Language::loadLanguage()` constructs a file path using this value and executes it via `require`, achieving arbitrary PHP code execution as the web server user. Version 2.3.6 fixes the issue.
Detalles CVE
Puntuacion CVSS v3.19.9
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado4/23/2026
Ultima modificacion4/23/2026
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-98
Referencias
https://github.com/froxlor/froxlor/commit/bc5e6dbaa90e6f3573129da640595e8c770e1d0c(security-advisories@github.com)
https://github.com/froxlor/froxlor/releases/tag/2.3.6(security-advisories@github.com)
https://github.com/froxlor/froxlor/security/advisories/GHSA-w59f-67xm-rxx7(security-advisories@github.com)
https://github.com/froxlor/froxlor/security/advisories/GHSA-w59f-67xm-rxx7(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.