Description
Froxlor is open source server administration software. Prior to version 2.3.6, `DataDump.add()` constructs the export destination path from user-supplied input without passing the `$fixed_homedir` parameter to `FileDir::makeCorrectDir()`, bypassing the symlink validation that was added to all other customer-facing path operations (likely as the fix for CVE-2023-6069). When the ExportCron runs as root, it executes `chown -R` on the resolved symlink target, allowing a customer to take ownership of arbitrary directories on the system. Version 2.3.6 contains an updated fix.
Published: 2026-04-23
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Directory Ownership Takeover
Action: Immediate Patch
AI Analysis

Impact

Froxlor’s DataDump.add() method previously built the export destination path from user input without applying the fixed homedir validation, allowing a symlink to point to any system directory. When the ExportCron task, which runs under the root account, expands that path it resolves the symlink and executes a recursive chown. An attacker who can invoke the export function—such as a local or remote user with access to the Froxlor web interface—can therefore cause root to change the ownership of any directory they can reference with a symlink, effectively taking administrative control over arbitrary parts of the file system. The flaw resides in the CWE‑59 category of Relative Path Traversal/Symbolic Link Vulnerability. The vulnerability is exploitable only when ExportCron runs with root privileges and the attacker can provide input to DataDump.add. The exploit is straightforward: craft a symlink from the export path to a target directory and trigger the cron job. Once the chown runs, the attacker gains ownership of the target, enabling further compromise such as altering configurations, installing malware, or deleting files. CVSS score 7.5 classifies the issue as high severity, and the EPSS score of < 1% indicates a low but existing probability of real‑world exploitation. The flaw is not listed in CISA’s KEV catalog, but the ability to hijack ownership of arbitrary directories represents a significant privilege escalation that can compromise system integrity and availability. Affected installations are those running Froxlor older than 2.3.6 where ExportCron is configured to execute under the root user. Version 2.3.6 introduces the missing symlink validation and should be installed as soon as possible to mitigate the risk.

Affected Systems

The flaw affects installations of the Froxlor open‑source server administration software published before version 2.3.6. Users who have configured the built‑in ExportCron task to run as the root account are at risk, as the task will invoke DataDump.add on customer‑supplied exports and subsequently unwrap any symlink target with root privileges. The vulnerable code path is part of the DataDump module inside Froxlor. Applying the 2.3.6 release, which adds the missing fixed homedir check, eliminates the flaw. For older releases, the problem remains until patched.

Risk and Exploitability

The CVSS score of 7.5 indicates that the vulnerability offers significant impact, particularly when exploited to alter file ownership. EPSS < 1% suggests exploitation is unlikely but not impossible, especially in environments where customers can submit data to exporting functions. Attackers would first need to create or control a symlink that points to a target directory they wish to own; then they would trigger the cron job by invoking DataDump.add, which path‑resolves the symlink under root and runs chown‑R. Because the flaw is tied to a root‑executed cron job, the attack vector requires either legitimate user access with export privileges or a system misconfiguration that allows arbitrary code injection into the cron context. Even though the vulnerability is not currently listed in CISA KEV, the ability to seize ownership over arbitrary directories presents a serious privilege escalation and could break the isolation guarantees of the server. In sum, the risk is high in environments that run the export cron under root and expose export functions to customer input.

Generated by OpenCVE AI on April 28, 2026 at 07:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Froxlor to version 2.3.6 or later, which restores symlink validation in DataDump.add.
  • If upgrading immediately is not feasible, reconfigure the ExportCron task so it runs under a non‑root user or remove the cron job altogether to prevent the chown from executing with administrative privileges.
  • Restrict the export directory location to a non‑world‑writable path, disable creation of symlinks in that directory, and monitor for unexpected chown actions to detect any exploitation attempts.

Generated by OpenCVE AI on April 28, 2026 at 07:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-75h4-c557-j89r Froxlor has Incomplete Symlink Validation in DataDump.add() Allows Arbitrary Directory Ownership Takeover via Cron
History

Mon, 27 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Froxlor
Froxlor froxlor
CPEs cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:*
Vendors & Products Froxlor
Froxlor froxlor

Thu, 23 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
Description Froxlor is open source server administration software. Prior to version 2.3.6, `DataDump.add()` constructs the export destination path from user-supplied input without passing the `$fixed_homedir` parameter to `FileDir::makeCorrectDir()`, bypassing the symlink validation that was added to all other customer-facing path operations (likely as the fix for CVE-2023-6069). When the ExportCron runs as root, it executes `chown -R` on the resolved symlink target, allowing a customer to take ownership of arbitrary directories on the system. Version 2.3.6 contains an updated fix.
Title Froxlor has Incomplete Symlink Validation in DataDump.add() that Allows Arbitrary Directory Ownership Takeover via Cron
Weaknesses CWE-59
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-23T16:23:03.549Z

Reserved: 2026-04-18T03:47:03.134Z

Link: CVE-2026-41231

cve-icon Vulnrichment

Updated: 2026-04-23T14:48:34.964Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T04:16:19.947

Modified: 2026-04-27T17:01:42.803

Link: CVE-2026-41231

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T07:45:26Z

Weaknesses