CVE-2026-40499

radare2 prior to version 6.1.4 contains a command injection vulnerability in the PDB parser's print_gvars() function that allows attackers to execute arbitrary commands by embedding a newline byte in the PE section header name field. Attackers can craft a malicious PDB file with specially crafted section names to inject r2 commands that are executed when the idp command processes the file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*

History

01 May 2026, 15:20

Type Values Removed Values Added
CPE cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Radare
Radare radare2
References () https://github.com/radareorg/radare2/commit/5590c87deeb7eb2a106fd7aab9ca88bfeebb7397 - () https://github.com/radareorg/radare2/commit/5590c87deeb7eb2a106fd7aab9ca88bfeebb7397 - Patch
References () https://github.com/radareorg/radare2/issues/25752 - () https://github.com/radareorg/radare2/issues/25752 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/radareorg/radare2/releases/tag/6.1.4 - () https://github.com/radareorg/radare2/releases/tag/6.1.4 - Release Notes
References () https://www.vulncheck.com/advisories/radare2-command-injection-via-pdb-parser-print-gvars - () https://www.vulncheck.com/advisories/radare2-command-injection-via-pdb-parser-print-gvars - Third Party Advisory

20 Apr 2026, 16:16

Type Values Removed Values Added
References
  • {'url': 'https://blog.calif.io/p/mad-bugs-discovering-a-0-day-in-zero', 'source': 'disclosure@vulncheck.com'}

16 Apr 2026, 01:16

Type Values Removed Values Added
References
  • {'url': 'https://github.com/radareorg/radare2/pull/25731', 'source': 'disclosure@vulncheck.com'}

15 Apr 2026, 04:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-15 04:17

Updated : 2026-05-01 15:20


NVD link : CVE-2026-40499

Mitre link : CVE-2026-40499

CVE.ORG link : CVE-2026-40499


JSON object : View

Products Affected

radare

  • radare2
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')