{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T00:18:48.939","vulnerabilities":[{"cve":{"id":"CVE-2025-49091","sourceIdentifier":"cve@mitre.org","published":"2025-06-11T01:15:20.547","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code."},{"lang":"es","value":"KDE Konsole anterior a la versión 25.04.2 permite la ejecución remota de código en ciertos escenarios. Admite la carga de URL desde los controladores de esquema, como ssh://, telnet:// o rlogin://. Esto se puede ejecutar independientemente de si el binario ssh, telnet o rlogin está disponible. En este modo, existe una ruta de código donde, si ese binario no está disponible, Konsole recurre a /bin/bash para los argumentos proporcionados (es decir, la URL). Esto permite a un atacante ejecutar código arbitrario."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":6.0}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-670"}]}],"references":[{"url":"https://invent.kde.org/utilities/konsole/-/commit/09d20dea109050b4c02fb73095f327b5642a2b75","source":"cve@mitre.org"},{"url":"https://invent.kde.org/utilities/konsole/-/tags","source":"cve@mitre.org"},{"url":"https://kde.org/info/security/advisory-20250609-1.txt","source":"cve@mitre.org"},{"url":"https://konsole.kde.org/changelog.html","source":"cve@mitre.org"},{"url":"https://proofnet.de/publikationen/konsole_rce.html","source":"cve@mitre.org"},{"url":"https://www.openwall.com/lists/oss-security/2025/06/10/5","source":"cve@mitre.org"},{"url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00019.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}