CVE-2026-42167
Published: Tue, 28 Apr 2026 23:16
Summary
mod_sql in ProFTPD before 1.3.9a allows remote attackers to execute arbitrary code via a username, in scenarios where there is logging of USER requests with an expansion such as %U, and the SQL backen
Details
mod_sql in ProFTPD before 1.3.9a allows remote attackers to execute arbitrary code via a username, in scenarios where there is logging of USER requests with an expansion such as %U, and the SQL backend allows commands (e.g., COPY TO PROGRAM).
Are YOU affected by CVE-2026-42167?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-42167 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- http://www.proftpd.org/docs/RELEASE_NOTES-1.3.10rc1
- https://github.com/ZeroPathAI/proftpd-CVE-2026-42167-poc
- https://github.com/proftpd/proftpd/issues/2052
- https://www.openwall.com/lists/oss-security/2026/05/01/4
- https://zeropath.com/blog/proftpd-cve-2026-42167-auth-bypass-privesc-rce
- http://www.openwall.com/lists/oss-security/2026/05/01/13
- http://www.openwall.com/lists/oss-security/2026/05/01/4
- https://github.com/ZeroPathAI/proftpd-CVE-2026-42167-poc
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.