Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 10 Apr 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tclahr
Tclahr uac |
|
| Vendors & Products |
Tclahr
Tclahr uac |
Wed, 08 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injection vulnerability in the placeholder substitution and command execution pipeline where the _run_command() function passes constructed command strings directly to eval without proper sanitization. Attackers can inject shell metacharacters or command substitutions through attacker-controlled inputs including %line% values from foreach iterators and %user% / %user_home% values derived from system files to achieve arbitrary command execution with the privileges of the UAC process. | |
| Title | UAC < 3.3.0-rc1 Command Injection via Placeholder Substitution | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-09T19:32:44.357Z
Reserved: 2026-04-08T13:36:53.761Z
Link: CVE-2026-40032
Updated: 2026-04-09T19:32:40.243Z
Status : Awaiting Analysis
Published: 2026-04-08T22:16:23.827
Modified: 2026-04-13T15:02:47.353
Link: CVE-2026-40032
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:25:50Z