CVE-2026-40030

parseusbs before 1.9 contains an OS command injection vulnerability where the volume listing path argument (-v flag) is passed unsanitized into an os.popen() shell command with ls, allowing arbitrary command injection via crafted volume path arguments containing shell metacharacters. An attacker can provide a crafted volume path via the -v flag that injects arbitrary commands during volume content enumeration.
Configurations

Configuration 1 (hide)

cpe:2.3:a:khyrenz:parseusbs:*:*:*:*:*:*:*:*

History

13 Apr 2026, 20:27

Type Values Removed Values Added
First Time Khyrenz
Khyrenz parseusbs
CPE cpe:2.3:a:khyrenz:parseusbs:*:*:*:*:*:*:*:*
References () https://github.com/khyrenz/parseusbs/commit/99f05996494e7e41ea0c7e13145ba20eb793e46b - () https://github.com/khyrenz/parseusbs/commit/99f05996494e7e41ea0c7e13145ba20eb793e46b - Patch
References () https://github.com/khyrenz/parseusbs/pull/10 - () https://github.com/khyrenz/parseusbs/pull/10 - Issue Tracking
References () https://mobasi.ai/sentinel - () https://mobasi.ai/sentinel - Third Party Advisory
References () https://www.vulncheck.com/advisories/parseusbs-command-injection-via-volume-path-argument - () https://www.vulncheck.com/advisories/parseusbs-command-injection-via-volume-path-argument - Third Party Advisory

08 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-08 22:16

Updated : 2026-04-13 20:27


NVD link : CVE-2026-40030

Mitre link : CVE-2026-40030

CVE.ORG link : CVE-2026-40030


JSON object : View

Products Affected

khyrenz

  • parseusbs
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')