CVE-2026-40342 PUBLISHED

Firebird: Path Traversal + Arbitrary File Write Leads to Remote Code Execution

Assigner: GitHub_M
Reserved: 10.04.2026 Published: 17.04.2026 Updated: 17.04.2026

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the external engine plugin loader concatenates a user-supplied engine name into a filesystem path without filtering path separators or .. components. An authenticated user with CREATE FUNCTION privileges can use a crafted ENGINE name to load an arbitrary shared library from anywhere on the filesystem via path traversal. The library's initialization code executes immediately during loading, before Firebird validates the module, achieving code execution as the server's OS account. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 10

Product Status

Vendor FirebirdSQL
Product firebird
Versions
  • Version < 3.0.14 is affected
  • Version >= 4.0.0, < 4.0.7 is affected
  • Version >= 5.0.0, < 5.0.4 is affected

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE
  • CWE-427: Uncontrolled Search Path Element CWE
  • CWE-73: External Control of File Name or Path CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE