UAC (Unix-like Artifacts Collector) before 3.3.0-rc1...
High severity
Unreviewed
Published
Apr 9, 2026
to the GitHub Advisory Database
•
Updated Apr 9, 2026
Description
Published by the National Vulnerability Database
Apr 8, 2026
Published to the GitHub Advisory Database
Apr 9, 2026
Last updated
Apr 9, 2026
UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injection vulnerability in the placeholder substitution and command execution pipeline where the _run_command() function passes constructed command strings directly to eval without proper sanitization. Attackers can inject shell metacharacters or command substitutions through attacker-controlled inputs including %line% values from foreach iterators and %user% / %user_home% values derived from system files to achieve arbitrary command execution with the privileges of the UAC process.
References