Froxlor version 2.0.3 Stable suffers from a remote code execution vulnerability.
92d4d06936e944880eba0462ca060e3c5cf5fd5faa7fb6127b2b6e5ba0d6af0a
Froxlor versions 2.0.6 and below suffer from a bug that allows authenticated users to change the application logs path to any directory on the OS level which the user www-data can write without restrictions from the backend which leads to writing a malicious Twig template that the application will render. That leads to remote command execution under the user www-data.
a4048c5b1f41c4347f4543f9ad125a92d70622eb396c52b2aaf555132f774674