Server Administration Software Vulnerability in Froxlor
CVE-2026-30932

8.6HIGH

Key Information:

Vendor

Froxlor

Status
Vendor
CVE Published:
24 March 2026

What is CVE-2026-30932?

Froxlor, an open-source server administration software, has a vulnerability in the DomainZones.add API endpoint available to customers with DNS enabled. This flaw, present in versions before 2.3.5, allows for improper validation of the content field for specific DNS record types (LOC, RP, SSHFP, TLSA). An attacker can exploit this vulnerability to inject newlines and BIND zone file directives (like $INCLUDE) into the zone files, posing a potential risk when the DNS rebuild cron job executes. The issue has been resolved in version 2.3.5.

Affected Version(s)

froxlor < 2.3.5

References

CVSS V4

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.