CVE-2026-41229
Froxlor · Froxlor
An injection vulnerability in Froxlor's `PhpHelper` allows administrators to inject and execute arbitrary PHP code via unescaped string literals.
Executive summary
A critical injection vulnerability in Froxlor prior to version 2.3.6 allows an authenticated administrator to execute arbitrary PHP code by injecting malicious strings into configuration files.
Vulnerability
This is a code injection vulnerability where the PhpHelper::parseArrayToString() function fails to escape single quotes, allowing an administrator to inject malicious PHP code into lib/userdata.inc.php.
Business impact
By exploiting this flaw, an attacker with change_serversettings permission can gain persistent remote code execution, which executes on every page load. This grants the attacker ongoing control over the server environment, risking total data compromise and system integrity. The CVSS score of 9.1 underlines the severe risk to organizational infrastructure.
Remediation
Immediate Action: Upgrade to Froxlor version 2.3.6 or later to ensure proper escaping of configuration strings.
Proactive Monitoring: Audit the lib/userdata.inc.php file for any unauthorized modifications or embedded PHP code blocks.
Compensating Controls: Limit access to administrative functions and strictly enforce the principle of least privilege for all administrative accounts.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
This vulnerability allows for persistent code execution, making it a high-priority concern for any administrator. Immediate patching to version 2.3.6 is required to neutralize the injection vector and secure the server configuration.