Vulnerability Description
MemProcFS before 5.17 contains multiple unsafe library-loading patterns that enable DLL and shared-library hijacking across six attack surfaces, including bare-name LoadLibraryU and dlopen calls without path qualification for vmmpyc, libMSCompression, and plugin DLLs. An attacker who places a malicious DLL or shared library in the working directory or manipulates LD_LIBRARY_PATH can achieve arbitrary code execution when MemProcFS loads.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ufrisk | Memprocfs | < 5.17 |
Related Weaknesses (CWE)
References
- https://github.com/ufrisk/MemProcFS/commit/df80e6e83641f5004025ce661e6dd8139028dPatch
- https://github.com/ufrisk/MemProcFS/releases/tag/v5.17Product
- https://mobasi.ai/sentinelThird Party Advisory
- https://www.vulncheck.com/advisories/memprocfs-dll-shared-library-hijackingThird Party Advisory
FAQ
What is CVE-2026-40031?
CVE-2026-40031 is a vulnerability with a CVSS score of 7.8 (HIGH). MemProcFS before 5.17 contains multiple unsafe library-loading patterns that enable DLL and shared-library hijacking across six attack surfaces, including bare-name LoadLibraryU and dlopen calls witho...
How severe is CVE-2026-40031?
CVE-2026-40031 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-40031?
Check the references section above for vendor advisories and patch information. Affected products include: Ufrisk Memprocfs.