No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 28 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Dolphin Flatpak Confinement Bypass via FileManager1 Path Spoofing |
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kde
Kde dolphin |
|
| Vendors & Products |
Kde
Kde dolphin |
Tue, 28 Apr 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | KDE Dolphin before 25.12.3 allows applications in a Flatpak (or with AppArmor confinement) to open folders outside of the application sandbox without additional scrutiny. Dolphin's implementation of the FileManager1 protocol allows the path given to be any type of file, including scripts or executables. (By default, Dolphin will then prompt the user to determine if they want to launch a script or executable; however, the intended behavior is to block the attempted action, not present a consent prompt.) | |
| Weaknesses | CWE-669 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-28T13:44:54.714Z
Reserved: 2026-04-20T00:00:00.000Z
Link: CVE-2026-41525
Updated: 2026-04-28T13:40:11.678Z
Status : Received
Published: 2026-04-28T08:16:01.477
Modified: 2026-04-28T08:16:01.477
Link: CVE-2026-41525
No data.
OpenCVE Enrichment
Updated: 2026-04-28T12:45:31Z