Metrics
Affected Vendors & Products
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Wed, 18 Jun 2025 01:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Wed, 11 Jun 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Title | konsole: Konsole Remote Code Execution Vulnerability | |
| References | 
         | |
| Metrics | 
        
        
        threat_severity
         
  | 
    
        
        
        threat_severity
         
  | 
Wed, 11 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 11 Jun 2025 00:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code. | |
| Weaknesses | CWE-670 | |
| References | 
         | 
        
  | 
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: mitre
Published: 2025-06-11T00:00:00.000Z
Updated: 2025-06-18T00:12:14.361Z
Reserved: 2025-05-31T00:00:00.000Z
Link: CVE-2025-49091
Updated: 2025-06-18T00:12:14.361Z
Status : Awaiting Analysis
Published: 2025-06-11T01:15:20.547
Modified: 2025-06-18T01:15:28.803
Link: CVE-2025-49091