Bug 2371635 (CVE-2025-49091) - CVE-2025-49091 konsole: Konsole Remote Code Execution Vulnerability
Summary: CVE-2025-49091 konsole: Konsole Remote Code Execution Vulnerability
Keywords:
Status: NEW
Alias: CVE-2025-49091
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2371658 2371660 2371655 2371656 2371657 2371659
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-11 01:01 UTC by OSIDB Bzimport
Modified: 2025-07-31 06:29 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:12346 0 None None None 2025-07-31 06:29:40 UTC

Description OSIDB Bzimport 2025-06-11 01:01:02 UTC
KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code.

Comment 3 errata-xmlrpc 2025-07-31 06:29:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2025:12346 https://access.redhat.com/errata/RHSA-2025:12346


Note You need to log in before you can comment on or make changes to this bug.