CVE-2026-26279

CRITICAL
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 12, 2026 - 22:05 vuln.today
PoC Detected
Mar 05, 2026 - 21:19 vuln.today
Public exploit code
Patch Released
Mar 05, 2026 - 21:19 nvd
Patch available
CVE Published
Mar 03, 2026 - 23:15 nvd
CRITICAL 9.1

Description

Froxlor is open source server administration software. Prior to 2.3.4, a typo in Froxlor's input validation code (== instead of =) completely disables email format checking for all settings fields declared as email type. This allows an authenticated admin to store arbitrary strings in the panel.adminmail setting. This value is later concatenated into a shell command executed as root by a cron job, where the pipe character | is explicitly whitelisted. The result is full root-level Remote Code Execution. This vulnerability is fixed in 2.3.4.

Analysis

Command injection in Froxlor server admin before 2.3.4 due to typo (== instead of =) disabling input validation entirely. PoC and patch available.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all systems running Froxlor versions prior to 2.3.4 and assess email-dependent workflows for unauthorized changes. Within 7 days: Apply the vendor patch to all affected Froxlor installations and verify email validation is functioning correctly in test environments. …

Sign in for detailed remediation steps.

Priority Score

66
Low Medium High Critical
KEV: 0
EPSS: +0.6
CVSS: +46
POC: +20

Share

CVE-2026-26279 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy