- Description
- A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.
- Source
- secalert@redhat.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- secalert@redhat.com
- CWE-78
- Hype score
- Not currently trending
⚠️ URGENT for Developers & SysAdmins: Critical vulnerabilities (CVE-2024-53920, CVE-2025-1244) patched in Emacs for #Ubuntu 20.04/22.04/24.04 LTS. Read more: 👉 https://t.co/elni7kdlkq #Security https://t.co/ZOlSxf3YfL
@Cezar_H_Linux
4 Feb 2026
91 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-1244 A flaw was found in the Emacs text editor. Improper handling of custom "man" URI schemes allows attackers to execute arbitrary shell commands by tricking users into vis… https://t.co/PMaRtp7Js6
@CVEnew
12 Feb 2025
154 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes