Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kde
Kde kdenlive |
|
| Vendors & Products |
Kde
Kde kdenlive |
Sun, 10 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sun, 10 May 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Malicious Project File Enables Arbitrary Proxy Configurations |
Sat, 09 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kdenlive before 26.04.1 allows dangerous proxy parameters when an attacker-controlled project file is used. | |
| Weaknesses | CWE-829 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-11T14:51:24.540Z
Reserved: 2026-05-09T22:25:05.151Z
Link: CVE-2026-45184
Updated: 2026-05-11T14:51:21.305Z
Status : Deferred
Published: 2026-05-09T23:16:32.787
Modified: 2026-05-13T15:46:19.993
Link: CVE-2026-45184
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:24:21Z