Armis Logo< Back

CVE-2026-42167:

A SQL injection vulnerability in mod_sql for ProFTPD before 1.3.10rc1 allows remote attackers to execute arbitrary code by supplying a malicious username when USER request logging with expansions like %U is enabled and the SQL backend supports command execution features such as PostgreSQL's COPY TO PROGRAM.


Score
Info
A numerical rating that indicates how dangerous this vulnerability is.

8.1High
  • Published Date:Apr 28, 2026
  • CISA KEV Date:*No Data*
  • Industries Affected:20

Exploitability

  • Score:2.2
  • Attack Vector:NETWORK
  • Attack Complexity:HIGH
  • Privileges Required:NONE
  • User Interaction:NONE
  • Scope:UNCHANGED

Impact

  • Score:5.9
  • Confidentiality Impact:HIGH
  • Integrity Impact:HIGH
  • Availability Impact:HIGH

Description Preview

A SQL injection vulnerability in mod_sql for ProFTPD before 1.3.10rc1 allows remote attackers to execute arbitrary code by supplying a malicious username when USER request logging with expansions like %U is enabled and the SQL backend supports command execution features such as PostgreSQL's COPY TO PROGRAM.

Overview

CVE-2026-42167 affects the mod_sql module in ProFTPD versions prior to 1.3.10rc1. The vulnerability is a SQL injection flaw triggered when the FTP server logs USER login requests using SQL query templates containing username expansion variables (e.g., %U). Because the username value supplied by a connecting client is not properly sanitized before being interpolated into SQL statements, a remote attacker can inject arbitrary SQL. When the underlying database backend supports operating system command execution — most notably PostgreSQL's COPY TO PROGRAM directive — this injection can be leveraged to achieve remote code execution on the server host. No authentication is required to trigger the flaw, making it exploitable by any network-accessible attacker, though successful exploitation depends on a specific and non-default server configuration. The vulnerability has been assigned a CVSS v3.1 score of 8.1 (HIGH) reflecting its potential for complete system compromise.

Remediation

  • Administrators should upgrade ProFTPD to version 1.3.10rc1 or later, which contains the fix for this vulnerability. As an interim mitigation, SQL-based logging configurations that use username expansion variables such as %U in query templates should be reviewed and disabled or modified to avoid interpolating user-supplied input directly into SQL statements. Where PostgreSQL is used as the backend, database-level privileges should be audited to restrict or disable dangerous features such as COPY TO PROGRAM for the database user account utilized by ProFTPD. Network-level controls such as firewalls restricting FTP access to trusted sources can reduce exposure while a patch is being applied.

References

Industries Affected

Below is a list of industries most commonly impacted or potentially at risk based on intelligence.

Low
Mining icon
Mining
Utilities icon
Utilities
Information icon
Information
Construction icon
Construction
Retail Trade icon
Retail Trade
Manufacturing icon
Manufacturing
Wholesale Trade icon
Wholesale Trade
Educational Services icon
Educational Services
Finance and Insurance icon
Finance and Insurance
Public Administration icon
Public Administration
Real Estate Rental and Leasing icon
Real Estate Rental and Leasing
Transportation and Warehousing icon
Transportation and Warehousing
Accommodation and Food Services icon
Accommodation and Food Services
Health Care and Social Assistance icon
Health Care and Social Assistance
Arts, Entertainment, and Recreation icon
Arts, Entertainment, and Recreation
Management of Companies and Enterprises icon
Management of Companies and Enterprises
Agriculture, Forestry, Fishing and Hunting icon
Agriculture, Forestry, Fishing and Hunting
Other Services (except Public Administration) icon
Other Services (except Public Administration)
Professional, Scientific, and Technical Services icon
Professional, Scientific, and Technical Services
Administrative and Support and Waste Management and Remediation Services icon
Administrative and Support and Waste Management and Remediation Services

Focus on What Matters

See everything.Identify true risk.Proactively mitigate threats.Book a Demo

Let's talk!