Cyber Posture

CVE-2026-44331

High

Published: 05 May 2026

Published
05 May 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 7.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

In ProFTPD through 1.3.9a before 7666224, a SQL injection vulnerability in sqltab_fetch_clients_cb() in contrib/mod_wrap2_sql.c allows a remote attacker to inject arbitrary SQL commands via a crafted domain name that is accessed in a reverse DNS lookup. When "UseReverseDNS on" is…

more

enabled, the attacker-supplied hostname is passed unescaped into SQL queries. The character restrictions of DNS names may affect exploitability.

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-89

Penetration testing uses SQL injection payloads against database interfaces, identifying and supporting fixes for SQL injection weaknesses.

addresses: CWE-89

Validates query inputs to prevent SQL syntax or command manipulation.

Security SummaryAI

CVE-2026-44331 is a SQL injection vulnerability in ProFTPD versions through 1.3.9a before commit 7666224, specifically affecting the sqltab_fetch_clients_cb() function in contrib/mod_wrap2_sql.c. The flaw arises when the "UseReverseDNS on" configuration is enabled, allowing an attacker-supplied hostname from a reverse DNS lookup to be passed unescaped into SQL queries. This enables injection of arbitrary SQL commands via a crafted domain name, though DNS name character restrictions may limit exploitability. The vulnerability is rated 8.1 on the CVSS 3.1 scale (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-89.

A remote attacker with no privileges can exploit this vulnerability by controlling the hostname returned during a reverse DNS lookup for an incoming connection. Successful exploitation grants high confidentiality, integrity, and availability impacts through arbitrary SQL command execution against the backend database used by mod_wrap2_sql, potentially leading to data exfiltration, modification, or server compromise. The high attack complexity stems from the need to craft a domain name that evades DNS restrictions while forming valid malicious SQL.

Mitigation is addressed in the ProFTPD GitHub repository via commit 766622456440fbca33abd7927c523673a11d1ed1, which resolves the issue in versions prior to its application. Security practitioners should update ProFTPD to include this commit or later, or disable the UseReverseDNS option in configurations employing mod_wrap2_sql. Further details are available in the associated GitHub issue at https://github.com/proftpd/proftpd/issues/2057.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in public-facing ProFTPD FTP server (mod_wrap2_sql) directly enables remote exploitation of a network-accessible application without authentication.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References