Vulnerability Description
mod_sql in ProFTPD before 1.3.9a allows remote attackers to execute arbitrary code via a username, in scenarios where there is logging of USER requests with an expansion such as %U, and the SQL backend allows commands (e.g., COPY TO PROGRAM).
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- http://www.proftpd.org/docs/RELEASE_NOTES-1.3.10rc1
- https://github.com/ZeroPathAI/proftpd-CVE-2026-42167-poc
- https://github.com/proftpd/proftpd/issues/2052
- https://www.openwall.com/lists/oss-security/2026/05/01/4
- https://zeropath.com/blog/proftpd-cve-2026-42167-auth-bypass-privesc-rce
- http://www.openwall.com/lists/oss-security/2026/05/01/13
- http://www.openwall.com/lists/oss-security/2026/05/01/4
- https://github.com/ZeroPathAI/proftpd-CVE-2026-42167-poc
FAQ
What is CVE-2026-42167?
CVE-2026-42167 is a vulnerability with a CVSS score of 8.1 (HIGH). mod_sql in ProFTPD before 1.3.9a allows remote attackers to execute arbitrary code via a username, in scenarios where there is logging of USER requests with an expansion such as %U, and the SQL backen...
How severe is CVE-2026-42167?
CVE-2026-42167 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-42167?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.