← Zuruck zu CVEs
CVE-2026-26982
MEDIUM6.3
Beschreibung
Ghostty is a cross-platform terminal emulator. Ghostty allows control characters such as 0x03 (Ctrl+C) in pasted and dropped text. These can be used to execute arbitrary commands in some shell environments. This attack requires an attacker to convince the user to copy and paste or drag and drop malicious text. The attack requires user interaction to be triggered, but the dangerous characters are invisible in most GUI environments so it isn't trivially detected, especially if the string contents are complex. Fixed in Ghostty v1.3.0.
CVE Details
CVSS v3.1 Bewertung6.3
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht3/10/2026
Zuletzt geandert3/13/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
ghostty:ghostty
Schwachen (CWE)
CWE-78
Referenzen
https://github.com/ghostty-org/ghostty/commit/fe7427ed2a1a02aef85495b384cfb8f11ee5efc9(security-advisories@github.com)
https://github.com/ghostty-org/ghostty/pull/10746(security-advisories@github.com)
https://github.com/ghostty-org/ghostty/security/advisories/GHSA-4jxv-xgrp-5m3r(security-advisories@github.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.