[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-41229":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-23T10:19:07.713Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":32,"aliases":33,"duplicate_of":9,"upstream":34,"downstream":35,"duplicates":36,"related":37,"reserved_at":9,"published_at":38,"modified_at":38,"state":39,"summary":40,"references_raw":47,"kevs":63,"epss":9,"epss_history":64,"metrics":65,"affected":73},"CVE-2026-41229","Froxlor is open source server administration software. Prior to version 2.3.6, `PhpHelper::parseArrayToString()` writes string values into single-quoted PHP string literals without escaping single quotes. When an admin with `change_serversettings` permission adds or updates a MySQL server via the API, the `privileged_user` parameter (which has no input validation) is written unescaped into `lib/userdata.inc.php`. Since this file is `require`d on every request via `Database::getDB()`, an attacker can inject arbitrary PHP code that executes as the web server user on every subsequent page load. Version 2.3.6 contains a patch.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-94","Improper Control of Generation of Code ('Code Injection')","The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.","weakness","Draft","Base","Medium",[20,24,28],{"id":21,"name":22,"techniques":23},"CAPEC-242","Code Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-35","Leverage Executable Code in Non-Executable Files",[],{"id":29,"name":30,"techniques":31},"CAPEC-77","Manipulating User-Controlled Variables",[],[],[],[],[],[],[],"2026-04-23T03:44:25.617Z","Received",{"cisa_kev":41,"cisa_ransomware":41,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":42,"severity_score":43,"severity_version":44,"severity_source":45,"severity_vector":46,"severity_status":39},false,"critical",9.1,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",[48,54,59],{"url":49,"sources":50,"tags":52},"https://github.com/froxlor/froxlor/security/advisories/GHSA-gc9w-cc93-rjv8",[45,51],"nvd",[53],"X Refsource CONFIRM",{"url":55,"sources":56,"tags":57},"https://github.com/froxlor/froxlor/commit/3589ddf93ab59eb2a8971f0f56cbf6266d03c4ae",[45,51],[58],"X Refsource MISC",{"url":60,"sources":61,"tags":62},"https://github.com/froxlor/froxlor/releases/tag/2.3.6",[45,51],[58],[],[],[66,71],{"source":45,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":67,"cvss_v4_0":9},{"baseScore":43,"baseSeverity":68,"vectorString":46,"impactScore":69,"exploitabilityScore":70},"CRITICAL",10,5.9,{"source":51,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":72,"cvss_v4_0":9},{"baseScore":43,"baseSeverity":68,"vectorString":46,"impactScore":69,"exploitabilityScore":70},[74],{"ecosystem":9,"name":75,"vendor":75,"product":75,"cpe_part":76,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":77},"froxlor","a",[78],{"version":79,"is_range":80,"range_type":45,"version_start":9,"version_start_type":9,"version_end":81,"version_end_type":82,"fixed_in":9},"\u003C 2.3.6",true,"2.3.6","excluding"]