CVE-2026-41233
Description
Froxlor is open source server administration software. Prior to version 2.3.6, in Domains.add(), the adminid parameter is accepted from user input and used without validation when the calling reseller does not have the customers_see_all permission. This allows a reseller to attribute newly created domains to any other admin, bypassing their own domain quota (since the wrong admin's domains_used counter is incremented) and potentially exhausting another admin's quota. Version 2.3.6 fixes the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
froxlor/froxlorPackagist | < 2.3.6 | 2.3.6 |
Affected products
1Patches
1bf47ba153295fix possible unvalidated adminid in Domains.add() if admin/reseller does not have 'customer_see_all' privileges
1 file changed · +3 −0
lib/Froxlor/Api/Commands/Domains.php+3 −0 modified@@ -418,6 +418,9 @@ public function add() Response::dynamicError("Selected admin cannot have any more domains or could not be found"); } unset($admin); + } else { + // Force adminid to the caller's own ID when they don't have customers_see_all + $adminid = intval($this->getUserDetail('adminid')); } // set default path if admin/reseller has "change_serversettings == false" but we still
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/froxlor/froxlor/commit/bf47ba15329506e9f9662f9462463932aa80dff5nvdPatchWEB
- github.com/froxlor/froxlor/security/advisories/GHSA-jvx4-xv3m-hrj4nvdExploitVendor AdvisoryMitigationWEB
- github.com/advisories/GHSA-jvx4-xv3m-hrj4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-41233ghsaADVISORY
- github.com/froxlor/froxlor/releases/tag/2.3.6nvdRelease NotesWEB
News mentions
0No linked articles in our index yet.