Miggo Logo

CVE-2025-29773:
Froxlor allows Multiple Accounts to Share the Same Email Address Leading to Potential Privilege Escalation or Account Takeover

5.8

CVSS Score
3.1

Basic Information

EPSS Score
0.02934%
Published
3/11/2025
Updated
3/13/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
froxlor/froxlorcomposer<= 2.2.52.2.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing email uniqueness checks across admin and customer accounts. The patch adds SQL queries in Admins.php and Customers.php to validate() email uniqueness against the panel_admins table. The pre-patch versions of these functions did not perform these checks, allowing email reuse. The high confidence comes from the direct correlation between the added validation logic in the commit diff and the vulnerability description.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry t** vuln*r**ility is t**t us*rs (su** *s r*s*ll*rs or *ustom*rs) *r* **l* to *r**t* ***ounts wit* t** s*m* *m*il ***r*ss *s *n *xistin* ***ount (*.*., i* t** **min **s [**min@*roxlor.*om](m*ilto:**min@*roxlor.*om), ot**rs **n *lso *r**t*

Reasoning

T** vuln*r**ility st*ms *rom missin* *m*il uniqu*n*ss ****ks **ross **min *n* *ustom*r ***ounts. T** p*t** ***s SQL qu*ri*s in `**mins.p*p` *n* `*ustom*rs.p*p` to `v*li**t*()` *m*il uniqu*n*ss ***inst t** `p*n*l_**mins` t**l*. T** pr*-p*t** v*rsions