CVE-2026-40342
CRITICALFirebird: Path Traversal + Arbitrary File Write Leads to Remote Code Execution
Title source: cnaDescription
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the external engine plugin loader concatenates a user-supplied engine name into a filesystem path without filtering path separators or .. components. An authenticated user with CREATE FUNCTION privileges can use a crafted ENGINE name to load an arbitrary shared library from anywhere on the filesystem via path traversal. The library's initialization code executes immediately during loading, before Firebird validates the module, achieving code execution as the server's OS account. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
References (4)
Scores
CVSS v3
9.9
EPSS
0.0009
EPSS Percentile
26.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-22
CWE-427
CWE-73
CWE-94
Status
published
Products (4)
firebirdsql/firebird
< 3.0.14
FirebirdSQL/firebird
< 3.0.14
FirebirdSQL/firebird
>= 4.0.0, < 4.0.7
FirebirdSQL/firebird
>= 5.0.0, < 5.0.4
Published
Apr 17, 2026
Tracked Since
Apr 18, 2026