CVE-2026-40342

NameCVE-2026-40342
DescriptionFirebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the external engine plugin loader concatenates a user-supplied engine name into a filesystem path without filtering path separators or .. components. An authenticated user with CREATE FUNCTION privileges can use a crafted ENGINE name to load an arbitrary shared library from anywhere on the filesystem via path traversal. The library's initialization code executes immediately during loading, before Firebird validates the module, achieving code execution as the server's OS account. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firebird3.0 (PTS)bullseye3.0.7.33374.ds4-2vulnerable
bullseye (security)3.0.7.33374.ds4-2+deb11u1vulnerable
bookworm3.0.11.33637.ds4-2+deb12u1vulnerable
trixie3.0.12.ds7-13+deb13u1vulnerable
forky, sid3.0.13.ds7-2vulnerable
firebird4.0 (PTS)trixie (security), trixie4.0.5.3140.ds6-17+deb13u1vulnerable
forky, sid4.0.6.3221.ds6-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firebird3.0source(unstable)(unfixed)
firebird4.0source(unstable)(unfixed)

Notes

https://github.com/FirebirdSQL/firebird/security/advisories/GHSA-7pxc-h3rv-r257

Search for package or bug name: Reporting problems