CVE-2026-41230
Published:April 23, 2026
Updated:April 26, 2026
Froxlor is open source server administration software. Prior to version 2.3.6, "DomainZones::add()" accepts arbitrary DNS record types without a whitelist and does not sanitize newline characters in the "content" field. When a DNS type not covered by the if/elseif validation chain is submitted (e.g., "NAPTR", "PTR", "HINFO"), content validation is entirely bypassed. Embedded newline characters in the content survive "trim()" processing, are stored in the database, and are written directly into BIND zone files via "DnsEntry::__toString()". An authenticated customer can inject arbitrary DNS records and BIND directives ("$INCLUDE", "$ORIGIN", "$GENERATE") into their domain's zone file. Version 2.3.6 fixes the issue.
Affected Packages
https://github.com/froxlor/froxlor.git (GITHUB):
Affected version(s) >=0.9 <2.3.6Fix Suggestion:
Update to version 2.3.6froxlor/froxlor (PHP):
Affected version(s) >=dev-backup-feature <2.3.6Fix Suggestion:
Update to version 2.3.6Related Resources (3)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.4
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
HIGH
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
HIGH
Subsequent System Availability
LOW
CVSS v3
Base Score:
8.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
NONE
Integrity
HIGH
Availability
LOW
Weakness Type (CWE)
Improper Neutralization of CRLF Sequences ('CRLF Injection')
EPSS
Base Score:
0.04