Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-43929 PoC — kitty 安全漏洞

Source
Associated Vulnerability
Title:kitty 安全漏洞 (CVE-2025-43929)
Description:kitty是印度科维德·戈亚尔(Kovid Goyal)个人开发者的一个基于Python的GPU终端仿真软件。该软件可提供基本的终端功能,并且基于GPU渲染可降低系统负载,采用OpenGL进行渲染,可支持在Linux、Mac上使用。 kitty 0.41.0之前版本存在安全漏洞,该漏洞源于未确认本地可执行文件,可能导致任意代码执行。
Description
High severity vulnerability in KiTTY allowing for local executables to be ran without user confirmation under certain circumstances.
Readme
# CVE-2025-43929
Proof-of-concept for CVE-2025-43929, a high-severity vulnerability in KiTTY allowing for local executables to be ran without user confirmation under certain circumstances

## Vulnerability Type
CWE-346: CWE-346 Origin Validation Error

## Vulnerability Description
open_actions.py in kitty before 0.41.0 does not ask for user confirmation before running a local executable file that may have been linked from an untrusted document (e.g., a document opened in KDE ghostwriter).

## Vulnerability Demo
https://github.com/user-attachments/assets/87f0b35e-97b4-4b11-b495-b0112ae590e5

File Snapshot

[4.0K] /data/pocs/a116c71a2869f85862407b1fb8a0bb7b8a4bc328 ├── [4.0K] CVE-2025-43929-POC │   ├── [ 58] test │   └── [ 215] test.md └── [ 598] README.md 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.