Cyber Posture

CVE-2026-42167

High

Published: 28 April 2026

Published
28 April 2026
Modified
01 May 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0546 90.2th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2026-42167 affects the mod_sql module in ProFTPD versions before 1.3.9a. The vulnerability stems from improper handling of usernames in SQL queries, enabling remote attackers to execute arbitrary code. This occurs in configurations where USER requests are logged using expansions like %U and the SQL backend supports commands such as COPY TO PROGRAM, classified under CWE-89 (SQL Injection) with a CVSS v3.1 score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote unauthenticated attackers can exploit the flaw over the network by submitting a malicious username during the authentication process. Successful exploitation leads to arbitrary code execution on the server, with high complexity required but no privileges or user interaction needed.

Mitigation involves upgrading to ProFTPD 1.3.9a or later, as indicated by the vulnerability's versioning. Official release notes for 1.3.10rc1 detail fixes at proftpd.org/docs/RELEASE_NOTES-1.3.10rc1, while a GitHub issue at proftpd/proftpd/issues/2052 tracks discussion. Additional resources include an OSS-security mailing list post from May 2026, a proof-of-concept at ZeroPathAI/proftpd-CVE-2026-42167-poc, and a ZeroPath blog analyzing authentication bypass, privilege escalation, and RCE aspects.

Details

CWE(s)
CWE-89

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows remote, unauthenticated arbitrary code execution via SQL injection in a public-facing ProFTPD server, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References