Froxlor is open source server administration software. Prior to version 2.3.5, the DomainZones.add API endpoint (accessible to customers with DNS enabled) does not validate the content field for several DNS record types (LOC, RP, SSHFP, TLSA). An attacker can inject newlines and BIND zone file directives (e.g. $INCLUDE) into the zone file that gets written to disk when the DNS rebuild cron job runs. This issue has been patched in version 2.3.5.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Froxlor
Froxlor froxlor |
|
| Vendors & Products |
Froxlor
Froxlor froxlor |
Tue, 24 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Froxlor is open source server administration software. Prior to version 2.3.5, the DomainZones.add API endpoint (accessible to customers with DNS enabled) does not validate the content field for several DNS record types (LOC, RP, SSHFP, TLSA). An attacker can inject newlines and BIND zone file directives (e.g. $INCLUDE) into the zone file that gets written to disk when the DNS rebuild cron job runs. This issue has been patched in version 2.3.5. | |
| Title | Froxlor is vulnerable to BIND zone file injection via unsanitized DNS record content in DomainZones API | |
| Weaknesses | CWE-74 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-24T18:46:13.137Z
Updated: 2026-03-25T13:31:13.459Z
Reserved: 2026-03-07T16:40:05.885Z
Link: CVE-2026-30932
Updated: 2026-03-25T13:31:05.256Z
Status : Awaiting Analysis
Published: 2026-03-24T19:16:51.863
Modified: 2026-03-25T15:41:58.280
Link: CVE-2026-30932
No data.