We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication.
Reserved 2025-08-01 | Published 2025-08-01 | Updated 2025-08-01 | Assigner VulnCheckCWE-269 Improper Privilege Management
HTP
raw.githubusercontent.com/...s/linux/local/kloxo_lxsuexec.rb
www.exploit-db.com/exploits/25406
web.archive.org/...p://roothackers.net/showthread.php?tid=92
kloxo.org/
github.com/KloxoNGCommunity/kloxo
www.vulncheck.com/advisories/kloxo-local-priv-esc
Support options