CVE-2026-30932 PUBLISHED

Froxlor is vulnerable to BIND zone file injection via unsanitized DNS record content in DomainZones API

Assigner: GitHub_M
Reserved: 07.03.2026 Published: 24.03.2026 Updated: 25.03.2026

Froxlor is open source server administration software. Prior to version 2.3.5, the DomainZones.add API endpoint (accessible to customers with DNS enabled) does not validate the content field for several DNS record types (LOC, RP, SSHFP, TLSA). An attacker can inject newlines and BIND zone file directives (e.g. $INCLUDE) into the zone file that gets written to disk when the DNS rebuild cron job runs. This issue has been patched in version 2.3.5.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.6

Product Status

Vendor froxlor
Product froxlor
Versions
  • Version < 2.3.5 is affected

References

Problem Types

  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE