{"vulnerability": "CVE-2025-49091", "sightings": [{"uuid": "0de9ad87-5ac2-48a0-b1f1-c6c30cb79712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/242", "content": "", "creation_timestamp": "2025-06-10T16:00:55.000000Z"}, {"uuid": "2bd81897-24cf-4977-8d07-1f52b437b18a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lreucjorme2g", "content": "", "creation_timestamp": "2025-06-12T02:20:00.624986Z"}, {"uuid": "ac1bb19b-c3c2-41d0-84ca-57941918b9c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lrbjvo2xda2s", "content": "", "creation_timestamp": "2025-06-10T18:35:51.903052Z"}, {"uuid": "41f7b044-0242-4120-a9b9-84b59df79e5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lrbkx2x3ea27", "content": "", "creation_timestamp": "2025-06-10T18:54:32.579292Z"}, {"uuid": "67e9ab63-5202-4707-a47c-1fc05e893daa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "https://bsky.app/profile/prohoster.bsky.social/post/3lrpiglm4i22s", "content": "", "creation_timestamp": "2025-06-16T07:46:48.857525Z"}, {"uuid": "77156a63-d265-4db4-bd63-5ae01cd9d2d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lrsb5trtzm2v", "content": "", "creation_timestamp": "2025-06-17T10:14:38.864698Z"}, {"uuid": "58595f82-6360-4192-9d9e-9d6f7bac6d26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lrcrjrlu4n27", "content": "", "creation_timestamp": "2025-06-11T06:25:02.658463Z"}, {"uuid": "4aad9355-b9d0-4a0f-86a9-b0d3c17af78c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114662257339032847", "content": "", "creation_timestamp": "2025-06-11T01:59:58.776677Z"}, {"uuid": "97a06b76-3326-4f4c-8aee-4e481b861872", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrcnzh3ih62o", "content": "", "creation_timestamp": "2025-06-11T05:22:13.494367Z"}, {"uuid": "1f1f4936-e53e-416d-b8be-1ad5d56c7919", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "https://s.ovalerio.net/users/dethos/statuses/114663986039029516", "content": "", "creation_timestamp": "2025-06-11T09:20:02.352830Z"}, {"uuid": "16b8b141-037b-4f49-8937-d8d8eedcb8d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-49091\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L)\n\ud83d\udd39 Description: KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code.\n\ud83d\udccf Published: 2025-06-11T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-11T00:32:09.368Z\n\ud83d\udd17 References:\n1. https://invent.kde.org/utilities/konsole/-/tags\n2. https://konsole.kde.org/changelog.html\n3. https://www.openwall.com/lists/oss-security/2025/06/10/5\n4. https://invent.kde.org/utilities/konsole/-/commit/09d20dea109050b4c02fb73095f327b5642a2b75\n5. https://kde.org/info/security/advisory-20250609-1.txt\n6. https://proofnet.de/publikationen/konsole_rce.html", "creation_timestamp": "2025-06-11T01:33:51.000000Z"}, {"uuid": "f3f3a094-a6b3-40a4-b205-42de453a6a7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "MISP/853ff921-86fb-463b-bc2a-2860bf336b81", "content": "", "creation_timestamp": "2025-08-21T10:03:56.000000Z"}, {"uuid": "286d14ea-ad8e-4aae-95d6-a93d42f8ad0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "https://t.me/habr_com_news/37649", "content": "\u0412 \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u0435\u043c\u043e\u043c \u043f\u0440\u043e\u0435\u043a\u0442\u043e\u043c KDE \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u044d\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u0435 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u0430 Konsole \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c\u0438 \u043f\u043e \u0418\u0411 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2025-49091), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043e\u0444\u043e\u0440\u043c\u043b\u0435\u043d\u043d\u043e\u0439 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b.\n\n#\u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c", "creation_timestamp": "2025-06-19T10:51:17.000000Z"}, {"uuid": "55688a27-babf-42b4-8010-c4b987efc3f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "MISP/853ff921-86fb-463b-bc2a-2860bf336b81", "content": "", "creation_timestamp": "2025-08-06T01:04:20.000000Z"}, {"uuid": "8ffa47bf-1871-4825-bad4-58395e7be30c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/5393", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 KDE Konsole, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435\nhttps://www.opennet.ru/opennews/art.shtml?num=63410\n\n\u041e\u0440\u0438\u0433\u0438\u043d\u0430\u043b\nCode execution from web browser using URL schemes handled by KDE's KTelnetService and Konsole (CVE-2025-49091)\nhttps://proofnet.de/publikationen/konsole_rce.html\n\n&gt; \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u0442\u0435\u043c, \u0447\u0442\u043e \u0432 \u0441\u043b\u0443\u0447\u0430\u0435, \u043a\u043e\u0433\u0434\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043d\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0430 \u0443\u0442\u0438\u043b\u0438\u0442\u0430 telnet, rlogin \u0438\u043b\u0438 ssh, Konsole \u043f\u0440\u0438 \u0432\u044b\u0437\u043e\u0432\u0435 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430 URL \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u043b \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u044b\u0439 \u0438\u043d\u0442\u0435\u0440\u043f\u0440\u0435\u0442\u0430\u0442\u043e\u0440 bash. \u041d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0435\u0441\u043b\u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 telnet \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 \u0441\u0441\u044b\u043b\u043a\u0438 \"telnet:///proc/self/cwd/Downloads/evil\" \u0432 Konsole \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u043b\u0441\u044f \"/bin/bash /proc/self/cwd/Downloads/evil\". \u041f\u043e \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0438 \u043c\u043e\u0436\u043d\u043e \u0441\u043e\u0432\u0435\u0440\u0448\u0438\u0442\u044c \u0430\u0442\u0430\u043a\u0443 \u043d\u0430 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 rlogin:// \u0438 ssh:// \u043f\u0440\u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0438 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0443\u0442\u0438\u043b\u0438\u0442 rlogin \u0438 ssh.\n\n&gt; \u0435\u0441\u043b\u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 telnet \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 \u0441\u0441\u044b\u043b\u043a\u0438 \"telnet:///proc/self/cwd/Downloads/evil\" \u0432 Konsole \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u043b\u0441\u044f \"/bin/bash /proc/self/cwd/Downloads/evil\"\n\n&gt; \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u043b\u0441\u044f \"/bin/bash\n\n\u042f \u0441\u0447\u0438\u0442\u0430\u044e, \u0447\u0442\u043e \u044d\u0442\u043e \u043f\u0440\u0435\u043a\u0440\u0430\u0441\u043d\u043e.\n\n\u0412\u043e\u043e\u0431\u0449\u0435, \u043a\u043e\u0433\u0434\u0430 \u0447\u0438\u0442\u0430\u043b \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0431\u0430\u0433\u0438, \u0442\u043e \u0432 \u0433\u043e\u043b\u043e\u0432\u0435 \u0441\u0440\u0430\u0437\u0443 \u0440\u043e\u0434\u0438\u043b\u0430\u0441\u044c \u043c\u044b\u0441\u043b\u044c, \u0447\u0442\u043e \u0432 \u043a\u043e\u0434\u0435 \u043f\u0440\u043e\u0441\u0442\u043e \u0438\u0433\u043d\u043e\u0440\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0438\u0435 \u043d\u0443\u0436\u043d\u043e\u0433\u043e \u0431\u0438\u043d\u0430\u0440\u044f \u0438 \u0434\u0430\u043b\u044c\u0448\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442\u0441\u044f \u0447\u0442\u043e-\u0442\u043e \u0442\u0438\u043f\u0430 \n\nbash &lt;\u043f\u0435\u0440\u0435\u043c\u0435\u043d\u043d\u0430\u044f_\u0441_\u043f\u0443\u0442\u0451\u043c_\u043a_\u0431\u0438\u043d\u0430\u0440\u044e&gt; path\n\n, \u0430 \u0442\u0430\u043a \u043a\u0430\u043a \u0431\u0438\u043d\u0430\u0440\u044f \u043d\u0435\u0442, \u0442\u043e \u0441\u0442\u0440\u043e\u043a\u0430 \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \"\u043a\u043e\u043d\u0441\u0442\u0440\u0443\u0438\u0440\u0443\u0435\u0442\u0441\u044f\" \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e.\n\n\u041f\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u043b \u0444\u0438\u043a\u0441, \u0442\u0430\u043a \u0438 \u043e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c \u043f\u043e \u0441\u0443\u0442\u0438\nhttps://invent.kde.org/utilities/konsole/-/commit/09d20dea109050b4c02fb73095f327b5642a2b75\n\n\u0422\u043e\u0442 \u043a\u0442\u043e \u043f\u0438\u0441\u0430\u043b \u043d\u0430 shell \u0441\u043a\u0440\u0438\u043f\u0442\u044b \u0441\u043b\u043e\u0436\u043d\u0435\u0435 \u0447\u0435\u043c hello world, \u0442\u043e\u0442 \u0442\u043e\u0447\u043d\u043e \u043b\u043e\u0432\u0438\u043b \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043f\u043e\u0445\u043e\u0436\u0438\u0435 \u0441 \u043f\u0443\u0441\u0442\u043e\u0439 \u043f\u0435\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439 \u0432 \u043e\u043a\u0440\u0443\u0436\u0435\u043d\u0438\u0438. \u0421\u0430\u043c\u043e\u0435, \u043a\u0430\u043a \u043f\u043e \u043c\u043d\u0435, \u043f\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u0438\u0437 \u044d\u0442\u043e\u0439 \u0441\u0435\u0440\u0438\u0438 \u0447\u0442\u043e-\u0442\u043e \u0442\u0438\u043f\u0430\n\nsudo rm -rf \"$IMPORTANT_DIR\"/lib \n\n, \u0433\u0434\u0435 \u043f\u0435\u0440\u0435\u043c\u0435\u043d\u043d\u0430\u044f IMPORTANT_DIR \u0442\u0435\u0440\u044f\u0435\u0442\u0441\u044f, \u0430 \u0432\u043c\u0435\u0441\u0442\u0435 \u0441 \u043d\u0435\u0439 \u0438 \u043b\u0438\u0431\u044b \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \ud83c\udf1d", "creation_timestamp": "2025-06-17T18:57:48.000000Z"}, {"uuid": "a04ac432-f4c4-4622-ac3f-1391db682ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-49091", "type": "seen", "source": "https://t.me/CyberBulletin/3444", "content": "\u26a1\ufe0fCode execution from web browser using URL schemes handled by KDE's KTelnetService and Konsole (CVE-2025-49091).\n\n#CyberBulletin", "creation_timestamp": "2025-06-11T10:44:05.000000Z"}]}