Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jvx4-xv3m-hrj4 | Froxlor has a Reseller Domain Quota Bypass via Unvalidated adminid Parameter in Domains.add() |
Mon, 27 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Froxlor
Froxlor froxlor |
|
| CPEs | cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Froxlor
Froxlor froxlor |
Thu, 23 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Froxlor is open source server administration software. Prior to version 2.3.6, in `Domains.add()`, the `adminid` parameter is accepted from user input and used without validation when the calling reseller does not have the `customers_see_all` permission. This allows a reseller to attribute newly created domains to any other admin, bypassing their own domain quota (since the wrong admin's `domains_used` counter is incremented) and potentially exhausting another admin's quota. Version 2.3.6 fixes the issue. | |
| Title | Froxlor has a Reseller Domain Quota Bypass via Unvalidated adminid Parameter in Domains.add() | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-23T12:26:22.883Z
Reserved: 2026-04-18T03:47:03.134Z
Link: CVE-2026-41233
Updated: 2026-04-23T12:26:07.267Z
Status : Analyzed
Published: 2026-04-23T05:16:05.477
Modified: 2026-04-27T16:59:16.020
Link: CVE-2026-41233
No data.
OpenCVE Enrichment
Updated: 2026-04-28T15:00:14Z
Github GHSA