Description
Froxlor is open source server administration software. Prior to version 2.3.6, in `Domains.add()`, the `adminid` parameter is accepted from user input and used without validation when the calling reseller does not have the `customers_see_all` permission. This allows a reseller to attribute newly created domains to any other admin, bypassing their own domain quota (since the wrong admin's `domains_used` counter is incremented) and potentially exhausting another admin's quota. Version 2.3.6 fixes the issue.
Published: 2026-04-23
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Resource Exhaustion via Domain Quota Bypass
Action: Immediate Upgrade
AI Analysis

Impact

The flaw in the Froxlor web‑interface occurs in the Domains.add() routine where the adminid parameter is accepted from user input without validation if the calling reseller does not have the customers_see_all permission. A reseller can therefore assign newly created domains to any other administrator, causing the domain counter of that unrelated admin to increment while the reseller’s own quota remains unchanged. This allows a reseller to exhaust another administrator’s domain quota, potentially locking that user out of adding new domains. The issue is a classic example of improper authorization characterized by CWE‑863.

Affected Systems

The vulnerability affects the Froxlor server administration software, specifically all releases prior to version 2.3.6. Users running Froxlor 2.3.5 or earlier, regardless of operating system, are susceptible because the flaw resides in the core domain‑management code. Version 2.3.6 and later contain the necessary validation to prevent the abuse.

Risk and Exploitability

The CVSS score of 5.4 indicates a medium severity. The EPSS score of less than 1% suggests a low likelihood of public exploitation, and the vulnerability is not listed in the CISA KEV catalog. An attacker must possess reseller‑level access to the management interface, but otherwise needs no special conditions; the attack can be performed by simply submitting a domain‑creation request with a crafted adminid. The impact is limited to evading the intended resource quotas rather than achieving code execution or broader system compromise.

Generated by OpenCVE AI on April 28, 2026 at 14:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Froxlor to version 2.3.6 or later, which validates the adminid parameter and prevents the quota bypass.
  • Review the customers_see_all permission settings for resellers and adjust as necessary to ensure correct visibility of customer accounts.
  • Enable logging of domain creation requests and monitor logs for adminid values that do not match the logged-in reseller to detect exploitation attempts.

Generated by OpenCVE AI on April 28, 2026 at 14:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jvx4-xv3m-hrj4 Froxlor has a Reseller Domain Quota Bypass via Unvalidated adminid Parameter in Domains.add()
History

Mon, 27 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Froxlor
Froxlor froxlor
CPEs cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:*
Vendors & Products Froxlor
Froxlor froxlor

Thu, 23 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 05:00:00 +0000

Type Values Removed Values Added
Description Froxlor is open source server administration software. Prior to version 2.3.6, in `Domains.add()`, the `adminid` parameter is accepted from user input and used without validation when the calling reseller does not have the `customers_see_all` permission. This allows a reseller to attribute newly created domains to any other admin, bypassing their own domain quota (since the wrong admin's `domains_used` counter is incremented) and potentially exhausting another admin's quota. Version 2.3.6 fixes the issue.
Title Froxlor has a Reseller Domain Quota Bypass via Unvalidated adminid Parameter in Domains.add()
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-23T12:26:22.883Z

Reserved: 2026-04-18T03:47:03.134Z

Link: CVE-2026-41233

cve-icon Vulnrichment

Updated: 2026-04-23T12:26:07.267Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T05:16:05.477

Modified: 2026-04-27T16:59:16.020

Link: CVE-2026-41233

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T15:00:14Z

Weaknesses