A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code execution or other severe impacts.
History

Thu, 26 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code execution or other severe impacts.
Title Gvfs: ftp gvfs backend: arbitrary ftp command injection via crlf sequences in file paths
First Time appeared Redhat
Redhat enterprise Linux
Weaknesses CWE-93
CPEs cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-02-26T15:10:47.917Z

Reserved: 2026-02-26T13:34:41.532Z

Link: CVE-2026-28296

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-26T16:24:09.580

Modified: 2026-02-26T16:24:09.580

Link: CVE-2026-28296

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.