Remote Code Execution Vulnerability in KDE Konsole by KDE
CVE-2025-49091

8.2HIGH

Key Information:

Vendor

Kde

Status
Vendor
CVE Published:
11 June 2025

What is CVE-2025-49091?

CVE-2025-49091 is a remote code execution vulnerability found in KDE Konsole, a terminal emulator included in the KDE desktop environment, which is commonly used in Linux and other UNIX-like operating systems. Its primary function is to provide users with a command-line interface to execute shell commands and manage system tasks. This vulnerability allows an attacker to execute arbitrary code on a victim's machine by exploiting a specific scenario when users load URLs through supported schemes like ssh, telnet, or rlogin. Notably, if the necessary binaries for these protocols are unavailable, Konsole defaults to using the /bin/bash shell to interpret the provided argument, inadvertently opening up a pathway for malicious commands to be executed. This could have severe implications for any organization utilizing KDE Konsole for their terminal operations, as it could lead to unauthorized access or manipulation of sensitive data.

Potential impact of CVE-2025-49091

  1. Unauthorized Remote Code Execution: The core risk associated with CVE-2025-49091 is the potential for unauthorized users to execute arbitrary code on systems running an affected version of KDE Konsole. This capability can lead to full system compromise, allowing attackers to install malware, exfiltrate data, or disrupt services.

  2. Data Breaches: Given that KDE Konsole is often used in environments that handle sensitive information, successful exploitation of this vulnerability can result in significant data breaches. Attackers could gain access to confidential files, user credentials, or sensitive application data, which may lead to further exploitation or financial loss.

  3. System Disruption and Malware Propagation: With the ability to execute arbitrary commands, attackers could disrupt critical services or deploy malware that spreads across networks. This not only compromises the affected system but could also facilitate lateral movement within an organization, impacting multiple systems and escalating the severity of the incident.

Affected Version(s)

Konsole 0 < 25.04.2

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

.