Skip to content
CVSS 6.5 · MEDIUM

CVE-2026-41526

In KDE KCoreAddons before 6.25, KShell::quoteArgs is intended to safely quote arguments so that they can be passed to a shell command. This parsing does not adequately handle metacharacters, leading to an escape from the shell. All applications relying on this method in a security-critical path to handle user input are affected and could be exploited. In particular, because sendInput() sends a string to a terminal, a control character such as \x01 can be used during injection.

View on NVD

Severity

Score: 6.5(MEDIUM)
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
AV: LOCAL
AC: HIGH
PR: NONE
UI: REQUIRED
S: UNCHANGED
C: HIGH
I: HIGH
A: LOW
Weakness (CWE): CWE-150

EPSS

Probability of exploitation (next 30 days): 0.0003 (0.0%)
Percentile: 8.9%
EPSS: 2026-05-06

Affects

kde:kcoreaddons

Technical description

In KDE KCoreAddons before 6.25, KShell::quoteArgs is intended to safely quote arguments so that they can be passed to a shell command. This parsing does not adequately handle metacharacters, leading to an escape from the shell. All applications relying on this method in a security-critical path to handle user input are affected and could be exploited. In particular, because sendInput() sends a string to a terminal, a control character such as \x01 can be used during injection.

Published: 4/28/2026, 8:16:01 AM
Last modified: 5/5/2026, 5:25:06 PM

References

HomeEventsBlogResourcesTeam