radare2 prior to version 6.1.4 contains a command injection vulnerability in the PDB parser's print_gvars() function that allows attackers to execute arbitrary commands by embedding a newline byte in the PE section header name field. Attackers can craft a malicious PDB file with specially crafted section names to inject r2 commands that are executed when the idp command processes the file.
References
| Link | Resource |
|---|---|
| https://github.com/radareorg/radare2/commit/5590c87deeb7eb2a106fd7aab9ca88bfeebb7397 | Patch |
| https://github.com/radareorg/radare2/issues/25752 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/radareorg/radare2/releases/tag/6.1.4 | Release Notes |
| https://www.vulncheck.com/advisories/radare2-command-injection-via-pdb-parser-print-gvars | Third Party Advisory |
Configurations
History
01 May 2026, 15:20
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Radare
Radare radare2 |
|
| References | () https://github.com/radareorg/radare2/commit/5590c87deeb7eb2a106fd7aab9ca88bfeebb7397 - Patch | |
| References | () https://github.com/radareorg/radare2/issues/25752 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://github.com/radareorg/radare2/releases/tag/6.1.4 - Release Notes | |
| References | () https://www.vulncheck.com/advisories/radare2-command-injection-via-pdb-parser-print-gvars - Third Party Advisory |
20 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
16 Apr 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
15 Apr 2026, 04:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-15 04:17
Updated : 2026-05-01 15:20
NVD link : CVE-2026-40499
Mitre link : CVE-2026-40499
CVE.ORG link : CVE-2026-40499
JSON object : View
Products Affected
radare
- radare2
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
