CVE Alert: CVE-2025-49091

Vulnerability Summary: CVE-2025-49091
KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code.
Affected Endpoints:
No affected endpoints listed.
Published Date:
6/11/2025, 1:15:20 AM
🔥 CVSS Score:
Exploit Status:
Not ExploitedEPS Score: 0.00119 | Ranking EPS: 0.31993
References:
- https://invent.kde.org/utilities/konsole/-/commit/09d20dea109050b4c02fb73095f327b5642a2b75
- https://invent.kde.org/utilities/konsole/-/tags
- https://kde.org/info/security/advisory-20250609-1.txt
- https://konsole.kde.org/changelog.html
- https://proofnet.de/publikationen/konsole_rce.html
- https://www.openwall.com/lists/oss-security/2025/06/10/5
Recommended Action:
No proposed action available. Please refer to vendor documentation for updates.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.