Description
A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code execution or other severe impacts.
Exploits (1)
github
WORKING POC
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2026-28296
Scores
CVSS v3
4.3
EPSS
0.0006
EPSS Percentile
18.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Lab Environment
ftpserver
gvfs-client
gvfs-patched
malicious-ftpserver
docker pull ghcr.io/exploitintel/cve-2026-28296-ftpserver:latest
Classification
CWE
CWE-93
Status
draft
Timeline
Published
Feb 26, 2026
Tracked Since
Feb 26, 2026