In KDE KCoreAddons before 6.25, KShell::quoteArgs is intended to safely quote arguments so that they can be passed to a shell command. This parsing does not adequately handle metacharacters, leading to an escape from the shell. All applications relying on this method in a security-critical path to handle user input are affected and could be exploited. In particular, because sendInput() sends a string to a terminal, a control character such as \x01 can be used during injection.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kde
Kde kcoreaddons |
|
| Vendors & Products |
Kde
Kde kcoreaddons |
Tue, 28 Apr 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In KDE KCoreAddons before 6.25, KShell::quoteArgs is intended to safely quote arguments so that they can be passed to a shell command. This parsing does not adequately handle metacharacters, leading to an escape from the shell. All applications relying on this method in a security-critical path to handle user input are affected and could be exploited. In particular, because sendInput() sends a string to a terminal, a control character such as \x01 can be used during injection. | |
| Weaknesses | CWE-150 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-28T06:52:22.174Z
Reserved: 2026-04-20T00:00:00.000Z
Link: CVE-2026-41526
No data.
Status : Received
Published: 2026-04-28T08:16:01.647
Modified: 2026-04-28T08:16:01.647
Link: CVE-2026-41526
No data.
OpenCVE Enrichment
Updated: 2026-04-28T09:16:39Z
Weaknesses