In KDE KCoreAddons before 6.25, KShell::quoteArgs is intended to safely quote arguments so that they can be passed to a shell command. This parsing does not adequately handle metacharacters, leading to an escape from the shell. All applications relying on this method in a security-critical path to handle user input are affected and could be exploited. In particular, because sendInput() sends a string to a terminal, a control character such as \x01 can be used during injection.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kde
Kde kcoreaddons |
|
| Vendors & Products |
Kde
Kde kcoreaddons |
Tue, 28 Apr 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In KDE KCoreAddons before 6.25, KShell::quoteArgs is intended to safely quote arguments so that they can be passed to a shell command. This parsing does not adequately handle metacharacters, leading to an escape from the shell. All applications relying on this method in a security-critical path to handle user input are affected and could be exploited. In particular, because sendInput() sends a string to a terminal, a control character such as \x01 can be used during injection. | |
| Weaknesses | CWE-150 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-28T06:52:22.174Z
Reserved: 2026-04-20T00:00:00.000Z
Link: CVE-2026-41526
No data.
Status : Received
Published: 2026-04-28T08:16:01.647
Modified: 2026-04-28T08:16:01.647
Link: CVE-2026-41526
No data.
OpenCVE Enrichment
Updated: 2026-04-28T09:16:39Z