Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-41231— Froxlor has Incomplete Symlink Validation in DataDump.add() that Allows Arbitrary Directory Ownership Takeover via Cron

CVSS 7.5 · High EPSS 0.07% · P23
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-41231

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Froxlor has Incomplete Symlink Validation in DataDump.add() that Allows Arbitrary Directory Ownership Takeover via Cron
Source: NVD (National Vulnerability Database)
Vulnerability Description
Froxlor is open source server administration software. Prior to version 2.3.6, `DataDump.add()` constructs the export destination path from user-supplied input without passing the `$fixed_homedir` parameter to `FileDir::makeCorrectDir()`, bypassing the symlink validation that was added to all other customer-facing path operations (likely as the fix for CVE-2023-6069). When the ExportCron runs as root, it executes `chown -R` on the resolved symlink target, allowing a customer to take ownership of arbitrary directories on the system. Version 2.3.6 contains an updated fix.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
在文件访问前对链接解析不恰当(链接跟随)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Froxlor 后置链接漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Froxlor是Froxlor团队的一套轻量级服务器管理软件。 Froxlor 2.3.6之前版本存在后置链接漏洞,该漏洞源于DataDump.add()在构建导出目标路径时未传递$fixed_homedir参数,绕过符号链接验证,导致客户可以获取系统上任意目录的所有权。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
froxlorfroxlor < 2.3.6 -

II. Public POCs for CVE-2026-41231

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-41231

登录查看更多情报信息。

Same Patch Batch · froxlor · 2026-04-23 · 6 CVEs total

CVE-2026-4122810.0 CRITICALFroxlor has Local File Inclusion via path traversal in API `def_language` parameter that l
CVE-2026-412299.1 CRITICALFroxlor has a PHP Code Injection via Unescaped Single Quotes in userdata.inc.php Generatio
CVE-2026-412308.5 HIGHFroxlor has a BIND Zone File Injection via Unsanitized DNS Record Content in DomainZones::
CVE-2026-412335.4 MEDIUMFroxlor has a Reseller Domain Quota Bypass via Unvalidated adminid Parameter in Domains.ad
CVE-2026-412325.0 MEDIUMFroxlor has an Email Sender Alias Domain Ownership Bypass via Wrong Array Index that Allow

IV. Related Vulnerabilities

V. Comments for CVE-2026-41231

No comments yet


Leave a comment