๐Ÿ” CVE Alert

CVE-2026-40032

HIGH 7.8

UAC < 3.3.0-rc1 Command Injection via Placeholder Substitution

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
5th

UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injection vulnerability in the placeholder substitution and command execution pipeline where the _run_command() function passes constructed command strings directly to eval without proper sanitization. Attackers can inject shell metacharacters or command substitutions through attacker-controlled inputs including %line% values from foreach iterators and %user% / %user_home% values derived from system files to achieve arbitrary command execution with the privileges of the UAC process.

CWE CWE-78
Vendor tclahr
Product uac
Published Apr 8, 2026
Last Updated Apr 9, 2026
Stay Ahead of the Next One

Get instant alerts for tclahr uac

Be the first to know when new high vulnerabilities affecting tclahr uac are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

tclahr / UAC
0 โ‰ค 3.2.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/tclahr/uac/pull/443 github.com: https://github.com/tclahr/uac/commit/cb95d7166cd47908e1189d9669e43f9a6d3d707f github.com: https://github.com/tclahr/uac/commit/50ace60e172e38feb78347bdf579311c23eff078 github.com: https://github.com/tclahr/uac/commit/d0fca5e36d8d6a33a4404f0f6fe92b0424544589 github.com: https://github.com/tclahr/uac/issues/429 mobasi.ai: https://mobasi.ai/sentinel vulncheck.com: https://www.vulncheck.com/advisories/uac-rc1-command-injection-via-placeholder-substitution

Credits

Mobasi Security Team