{"id":"CVE-2025-1244","details":"A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.","modified":"2026-01-27T04:19:55.017551Z","published":"2025-02-12T15:15:18Z","withdrawn":"2026-01-27T04:19:55.017551Z","related":["ALSA-2025:1915","ALSA-2025:1917","MGASA-2025-0075","SUSE-SU-2025:0574-1","SUSE-SU-2025:0589-1","SUSE-SU-2025:0599-1","openSUSE-SU-2025:14767-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1915"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1917"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1961"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1962"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1963"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1964"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2022"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2130"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2157"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2195"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2754"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345150"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2025-1244"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/03/01/2"},{"type":"WEB","url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=66390"},{"type":"WEB","url":"https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-30.1"}],"schema_version":"1.7.3"}