{"uuid": "f29e824a-5a3b-44f5-9937-8a45d8984867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29773", "type": "seen", "source": "https://t.me/cvedetector/20241", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29773 - Froxlor Email Account Confusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29773 \nPublished : March 13, 2025, 5:15 p.m. | 43\u00a0minutes ago \nDescription : Froxlor is open-source server administration software. A vulnerability in versions prior to 2.2.6 allows users (such as resellers or customers) to create accounts with the same email address as an existing account. This creates potential issues with account identification and security. This vulnerability can be exploited by authenticated users (e.g., reseller, customer) who can create accounts with the same email address that has already been used by another account, such as the admin. The attack vector is email-based, as the system does not prevent multiple accounts from registering the same email address, leading to possible conflicts and security issues. Version 2.2.6 fixes the issue. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T19:48:19.000000Z"}