๐Ÿ” CVE Alert

CVE-2026-40030

HIGH 7.8

parseusbs < 1.9 Command Injection via Volume Path Argument

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
5th

parseusbs before 1.9 contains an OS command injection vulnerability where the volume listing path argument (-v flag) is passed unsanitized into an os.popen() shell command with ls, allowing arbitrary command injection via crafted volume path arguments containing shell metacharacters. An attacker can provide a crafted volume path via the -v flag that injects arbitrary commands during volume content enumeration.

CWE CWE-78
Vendor khyrenz
Product parseusbs
Published Apr 8, 2026
Last Updated Apr 9, 2026
Stay Ahead of the Next One

Get instant alerts for khyrenz parseusbs

Be the first to know when new high vulnerabilities affecting khyrenz parseusbs are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

khyrenz / parseusbs
0 < 1.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/khyrenz/parseusbs/pull/10 github.com: https://github.com/khyrenz/parseusbs/commit/99f05996494e7e41ea0c7e13145ba20eb793e46b mobasi.ai: https://mobasi.ai/sentinel vulncheck.com: https://www.vulncheck.com/advisories/parseusbs-command-injection-via-volume-path-argument

Credits

Mobasi Security Team