TopVuln

High-risk vulnerability digests

CVE-2026-41228

  • CRITICAL

Details

CVSS v3
9.9
NVD published
2026-04-23 04:16:19
EPSS
<0.1% probability · 22.2th percentile — 2026-05-12
Affected versions
Froxlor open source server administration software prior to 2.3.6
Summary
Froxlor's customer and admin update API endpoints fail to validate the `def_language` parameter against available language files. An authenticated attacker can inject a path traversal payload that is stored in the database and later executed via PHP require, leading to arbitrary code execution as the web server user. Version 2.3.6 fixes the input validation issue.
Remediation
Upgrade Froxlor to the patched version 2.3.6 immediately. Review user access permissions to remove any untrusted authenticated accounts if patching is delayed.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.