๐Ÿ” CVE Alert

CVE-2026-40517

HIGH 7.8

radare2 < 6.1.4 Command Injection via PDB Parser Symbol Names

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

radare2 prior to 6.1.4 contains a command injection vulnerability in the PDB parser's print_gvars() function that allows attackers to execute arbitrary commands by crafting a malicious PDB file with newline characters in symbol names. Attackers can inject arbitrary radare2 commands through unsanitized symbol name interpolation in the flag rename command, which are then executed when a user runs the idp command against the malicious PDB file, enabling arbitrary OS command execution through radare2's shell execution operator.

CWE CWE-78
Vendor radareorg
Product radare2
Published Apr 22, 2026
Last Updated Apr 22, 2026
Stay Ahead of the Next One

Get instant alerts for radareorg radare2

Be the first to know when new high vulnerabilities affecting radareorg radare2 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

radareorg / radare2
0 < 6.1.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
blog.calif.io: https://blog.calif.io/p/mad-bugs-discovering-a-0-day-in-zero github.com: https://github.com/radareorg/radare2/issues/25730 github.com: https://github.com/radareorg/radare2/pull/25731 vulncheck.com: https://www.vulncheck.com/advisories/radare2-command-injection-via-pdb-parser-symbol-names

Credits

Jun Rong of Calif.io