Description
UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injection vulnerability in the placeholder substitution and command execution pipeline where the _run_command() function passes constructed command strings directly to eval without proper sanitization. Attackers can inject shell metacharacters or command substitutions through attacker-controlled inputs including %line% values from foreach iterators and %user% / %user_home% values derived from system files to achieve arbitrary command execution with the privileges of the UAC process.
INFO
Published Date :
2026-04-08T21:35:27.020Z
Last Modified :
2026-04-09T19:32:44.357Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2026-40032 vulnerability.
| Vendors | Products |
|---|---|
| Tclahr |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-40032.