High severity7.8NVD Advisory· Published Apr 8, 2026· Updated Apr 17, 2026
CVE-2026-40031
CVE-2026-40031
Description
MemProcFS before 5.17 contains multiple unsafe library-loading patterns that enable DLL and shared-library hijacking across six attack surfaces, including bare-name LoadLibraryU and dlopen calls without path qualification for vmmpyc, libMSCompression, and plugin DLLs. An attacker who places a malicious DLL or shared library in the working directory or manipulates LD_LIBRARY_PATH can achieve arbitrary code execution when MemProcFS loads.
Affected products
1Patches
1df80e6e83641https://github.com/ufrisk/MemProcFSvia nvd-ref
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4- github.com/ufrisk/MemProcFS/commit/df80e6e83641f5004025ce661e6dd8139028d7b5nvdPatch
- mobasi.ai/sentinelnvdThird Party Advisory
- www.vulncheck.com/advisories/memprocfs-dll-shared-library-hijackingnvdThird Party Advisory
- github.com/ufrisk/MemProcFS/releases/tag/v5.17nvdProduct
News mentions
1- PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian NetworksThe Hacker News · Apr 27, 2026