No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 28 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Shell Argument Quoting Vulnerability Leading to Escape in KCoreAddons |
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kde
Kde kcoreaddons |
|
| Vendors & Products |
Kde
Kde kcoreaddons |
Tue, 28 Apr 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In KDE KCoreAddons before 6.25, KShell::quoteArgs is intended to safely quote arguments so that they can be passed to a shell command. This parsing does not adequately handle metacharacters, leading to an escape from the shell. All applications relying on this method in a security-critical path to handle user input are affected and could be exploited. In particular, because sendInput() sends a string to a terminal, a control character such as \x01 can be used during injection. | |
| Weaknesses | CWE-150 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-28T13:07:56.176Z
Reserved: 2026-04-20T00:00:00.000Z
Link: CVE-2026-41526
Updated: 2026-04-28T13:03:33.729Z
Status : Received
Published: 2026-04-28T08:16:01.647
Modified: 2026-04-28T08:16:01.647
Link: CVE-2026-41526
No data.
OpenCVE Enrichment
Updated: 2026-04-28T12:45:31Z