PoC Exploit Released for Yelp Flaw that Exposes SSH Keys on Ubuntu Systems
A proof-of-concept (PoC) exploit has been released for CVE-2025-3155, a critical vulnerability in GNOME’s Yelp help viewer that enables attackers to exfiltrate SSH keys and other sensitive files from Ubuntu systems. The flaw leverages improper handling of the ghelp:// URI scheme and XML processing to execute arbitrary JavaScript, exposing millions of Linux desktop users to […] The post PoC Exploit Released for Yelp Flaw that Exposes SSH Keys on Ubuntu Systems appeared first on Cyber Security News.

A proof-of-concept (PoC) exploit has been released for CVE-2025-3155, a critical vulnerability in GNOME’s Yelp help viewer that enables attackers to exfiltrate SSH keys and other sensitive files from Ubuntu systems.
The flaw leverages improper handling of the ghelp:// URI scheme and XML processing to execute arbitrary JavaScript, exposing millions of Linux desktop users to potential data theft.
Yelp, preinstalled on Ubuntu and other GNOME-based distributions, processes .page files using the Mallard XML schema.
Vulnerability Details
These files support XInclude, an XML inclusion mechanism that attackers exploited to inject malicious content. The vulnerability chain involves three key components:
ghelp URI Scheme:
Github reports that Yelp registers itself as the handler for ghelp:// URIs. A malicious link like ghelp:///proc/self/cwd/Downloads can trigger parsing of attacker-controlled .page files.
XInclude Arbitrary File Read:
Attackers craft .page files with directives like:
This allows the inclusion of system files (e.g., /proc/self/cwd/.ssh/id_rsa) into the rendered document.
SVG-Based Script Injection:
Yelp’s XSLT processor copies