Remote Code Execution in Froxlor Open Source Server Administration Software
CVE-2026-26279

9.1CRITICAL

Key Information:

Vendor

Froxlor

Status
Vendor
CVE Published:
3 March 2026

What is CVE-2026-26279?

CVE-2026-26279 is a serious vulnerability discovered in Froxlor, an open-source server management platform commonly utilized for administering web servers. The vulnerability stems from a coding error in Froxlor's input validation process, which has caused a failure in email format validation for certain settings. This flaw enables an authenticated administrator to input arbitrary strings into specific fields, particularly the panel.adminmail setting. These unvalidated inputs can subsequently be concatenated into a shell command, leading to the possibility of executing commands with root privileges through a scheduled cron job. Such capabilities can be detrimental to organizations as they open the door for attackers to take complete control of their server environments, potentially compromising sensitive data and overall system integrity.

Potential impact of CVE-2026-26279

  1. Full Root-Level Access: The vulnerability allows authenticated users to execute shell commands with root privileges. This level of access can enable a broad range of malicious actions, including data theft, unauthorized system modifications, and the installation of additional malware.

  2. Critical Data Breaches: Organizations relying on Froxlor for server management may face significant risks concerning data security. The ability to execute arbitrary commands can lead to the exposure of confidential information, resulting in data breaches that could have severe legal and financial repercussions.

  3. System Downtime and Operational Disruption: Exploitation of this vulnerability can lead to compromised systems, which may necessitate extensive recovery efforts, resulting in potential downtime and loss of operational functionality. This situation not only affects service availability but can also damage an organization's reputation among its users and clients.

Affected Version(s)

Froxlor < 2.3.4

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.