๐Ÿ” CVE Alert

CVE-2026-41229

CRITICAL 9.1

Froxlor has a PHP Code Injection via Unescaped Single Quotes in userdata.inc.php Generation (MysqlServer API)

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

Froxlor is open source server administration software. Prior to version 2.3.6, `PhpHelper::parseArrayToString()` writes string values into single-quoted PHP string literals without escaping single quotes. When an admin with `change_serversettings` permission adds or updates a MySQL server via the API, the `privileged_user` parameter (which has no input validation) is written unescaped into `lib/userdata.inc.php`. Since this file is `require`d on every request via `Database::getDB()`, an attacker can inject arbitrary PHP code that executes as the web server user on every subsequent page load. Version 2.3.6 contains a patch.

CWE CWE-94
Vendor froxlor
Product froxlor
Published Apr 23, 2026
Stay Ahead of the Next One

Get instant alerts for froxlor froxlor

Be the first to know when new critical vulnerabilities affecting froxlor froxlor are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

froxlor / froxlor
< 2.3.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/froxlor/froxlor/security/advisories/GHSA-gc9w-cc93-rjv8 github.com: https://github.com/froxlor/froxlor/commit/3589ddf93ab59eb2a8971f0f56cbf6266d03c4ae github.com: https://github.com/froxlor/froxlor/releases/tag/2.3.6