Impact
The vulnerability resides in the Dolphin FileManager1 protocol implementation, which allows an application running inside a Flatpak or AppArmor sandbox to supply a path that points to any file, including scripts or executables, located outside the sandbox. The intended behaviour of Dolphin is to block such actions, but the current implementation incorrectly presents a user‑confirmation prompt, effectively permitting the action. This flaw permits the sandboxed application to read, write, or execute arbitrary files outside its confinement, undermining the isolation guarantees and enabling possible privilege escalation or data exfiltration.
Affected Systems
KDE Dolphin versions earlier than 25.12.3 are affected. This includes all releases of Dolphin distributed by KDE prior to the v25.12.3 update.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The exploit requires an application able to communicate with Dolphin via the FileManager1 protocol; this is typically a Flatpak or AppArmor confined application. Because the flaw permits arbitrary file system access beyond the sandbox boundaries, it can be used to read sensitive data or execute malicious code. The lack of a confirmed public exploit suggests the risk remains theoretical, but the flaw provides a clear pathway for privilege escalation that should be addressed promptly.
OpenCVE Enrichment