Loading HuntDB...

GHSA-625g-fm5w-w7w4

GitHub Security Advisory

Froxlor username/surname AND company field Bypass

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Dear Sirs and Madams,

I would like to report a business logic error vulnerability that I discovered during my recent penetration test on Froxlor.

Specifically, I identified an issue where it was possible to submit the registration form with the essential fields, such as the username and password, left intentionally blank. This inadvertent omission allowed for a bypass of the mandatory field requirements established by the system.

The surname, family name AND company name all of them can be left blank.

I believe addressing this vulnerability is crucial to ensure the security and integrity of the Froxlor platform.

Thank you for your attention to this matter.

This action served as a means to bypass the mandatory field requirements.

Lets see (please have a look at the Video -> attachment).

----------------

as you can see i was able to let the username and second name blank.

https://user-images.githubusercontent.com/80028768/289675319-81ae8ebe-1308-4ee3-bedb-43cdc40da474.mp4

Lets see again.

Only the company name is set.

Thank you for your time

![Froxlor 2](https://user-images.githubusercontent.com/80028768/289685700-73936e19-befa-4442-a258-7814f2ec4598.png)
![Froxlor 1](https://user-images.githubusercontent.com/80028768/289685710-a5785f49-d2b2-40d4-bf8f-a286df48dd36.png)

Affected Packages

Packagist froxlor/froxlor
Affected versions: 0 (fixed in 2.1.2)

Related CVEs

Key Information

GHSA ID
GHSA-625g-fm5w-w7w4
Published
January 4, 2024 5:20 PM
Last Modified
January 4, 2024 5:20 PM
CVSS Score
7.5 /10
Primary Ecosystem
Packagist
Primary Package
froxlor/froxlor
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 7, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.