CVE-2026-42167: ProFTPD mod_sql RCE Via Log Expansion
The National Vulnerability Database has detailed CVE-2026-42167, a critical remote code execution (RCE) vulnerability in ProFTPD’s mod_sql module. This flaw impacts ProFTPD versions prior to 1.3.10rc1. The vulnerability hinges on a specific configuration where logging of USER requests includes expansions like %U, and the SQL backend permits COPY TO PROGRAM commands. This isn’t some theoretical bypass; it’s a direct path to arbitrary code execution if those conditions align.
Attackers can exploit this by crafting malicious usernames. When these usernames are logged and processed by an SQL backend configured to allow command execution, the attacker’s code runs. The CVSS score of 8.1 (High) reflects the severity: network-exploitable with high impact on confidentiality, integrity, and availability, requiring low attack complexity and no user interaction. This is a configuration-dependent RCE that demands immediate attention.
This isn’t just about patching. It’s about understanding the nuances of your logging configurations and SQL backend capabilities. If you’re running ProFTPD, especially in environments where mod_sql is active and logging is verbose, you’ve got a potential blind spot. Attackers are always looking for these kinds of chained misconfigurations. The risk here is direct system compromise without needing to bypass complex authentication mechanisms.
What This Means For You
- If your organization uses ProFTPD, especially with the `mod_sql` module, you need to immediately check your version. Patch to ProFTPD 1.3.10rc1 or newer. Crucially, audit your `mod_sql` logging configurations: disable expansions like `%U` in `USER` request logging and ensure your SQL backend does not allow `COPY TO PROGRAM` or similar command execution features for the ProFTPD user. This vulnerability is a direct RCE, so assume compromise if you're exposed and haven't patched.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-42167: ProFTPD mod_sql RCE via Log Expansion - User Input
title: CVE-2026-42167: ProFTPD mod_sql RCE via Log Expansion - User Input
id: scw-2026-04-28-ai-1
status: experimental
level: critical
description: |
This rule detects the specific pattern of a USER request with a log expansion like '%U' in the URI, which is indicative of the exploit path for CVE-2026-42167 in ProFTPD mod_sql. This allows remote attackers to execute arbitrary code when logging of USER requests with expansions is enabled and the SQL backend allows command execution.
author: SCW Feed Engine (AI-generated)
date: 2026-04-28
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-42167/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/%U'
cs-method|exact:
- 'USER'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-42167 | RCE | ProFTPD mod_sql |
| CVE-2026-42167 | RCE | ProFTPD before 1.3.10rc1 |
| CVE-2026-42167 | RCE | Vulnerable to arbitrary code execution via username in USER requests with %U expansion and SQL backend allowing commands (e.g., COPY TO PROGRAM) |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 29, 2026 at 02:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.