CVE-2026-26279: Froxlor RCE — Critical — Patch Now
CVE-2026-26279
Root-level RCE in Froxlor server panels due to email validation bypass (CVSS 9.1). An admin can execute arbitrary commands as root. Upgrade to version 2.3.4 to patch.
Patch now - CVE-2026-26279 is a critical remote code execution vulnerability in Froxlor versions prior to 2.3.4 that grants an authenticated administrator full root-level command execution on the server. Upgrade to version 2.3.4 to block this exploit.
Overview
A critical vulnerability has been identified in Froxlor, an open-source server administration panel. Due to a coding error, the software’s email address validation can be completely bypassed. This flaw allows an authenticated administrator to inject malicious commands that are later executed with the highest level of system privileges (root), leading to a complete compromise of the underlying server.
Vulnerability Details
In versions prior to 2.3.4, a simple typo in the validation code (using == instead of =) disabled format checking for any system setting defined as an email type. An attacker with admin access can exploit this by submitting a malicious string to the panel.adminmail setting.
This injected value is not properly sanitized and is later used in a shell command run automatically by a system cron job. Because the pipe (|) character is mistakenly allowed, an attacker can chain shell commands. Since the cron job executes as the root user, this leads to full Remote Code Execution (RCE), granting the attacker total control over the server.
Impact
The impact of this vulnerability is severe. A malicious administrator, or an attacker who has compromised an admin account, can:
- Execute arbitrary commands on the host operating system with root privileges.
- Install malware, create backdoors, or exfiltrate sensitive data.
- Compromise all services and data on the affected server.
- Use the server as a foothold to attack other systems on the network.
The CVSS score of 9.1 (CRITICAL) reflects the low attack complexity and high impact on confidentiality, integrity, and availability.
Remediation and Mitigation
Immediate action is required to secure affected systems.
Primary Remediation:
- Upgrade Immediately: All users must upgrade to Froxlor version 2.3.4 or later, which contains the fix for this vulnerability. This is the only complete solution.
Mitigation Steps (If Immediate Upgrade is Not Possible):
- Restrict Admin Access: Review and minimize the number of administrator accounts. Ensure all admin passwords are strong and unique.
- Audit Logs: Monitor Froxlor logs and system cron job logs for any unusual or unexpected command execution.
- Network Segmentation: Ensure servers running Froxlor are placed on isolated network segments to limit potential lateral movement in case of compromise.
Important Note: Mitigations are temporary measures and do not eliminate the vulnerability. Upgrading to the patched version is essential.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-26279?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
Froxlor is open source server administration software. Prior to version 2.3.6, `PhpHelper::parseArrayToString()` writes string values into single-quoted PHP string literals without escaping single quo...
Froxlor is open source server administration software. Prior to version 2.3.6, the Froxlor API endpoint `Customers.update` (and `Admins.update`) does not validate the `def_language` parameter against ...
Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. Prior to version 2.1.0, all Docker container management endpoints in Termix interpolate th...
Synway SMG Gateway Management Software contains an OS command injection vulnerability in the RADIUS configuration endpoint at /en/9-2radius.php where the radius_address POST parameter is split and int...
Other Froxlor Froxlor Vulnerabilities
Froxlor is open source server administration software. Prior to version 2.3.6, `PhpHelper::parseArrayToString()` writes string values into single-quoted PHP string literals without escaping single quo...
Froxlor is open source server administration software. Prior to version 2.3.6, the Froxlor API endpoint `Customers.update` (and `Admins.update`) does not validate the `def_language` parameter against ...