← Back to CVEs
CVE-2026-26982
MEDIUM6.3
Description
Ghostty is a cross-platform terminal emulator. Ghostty allows control characters such as 0x03 (Ctrl+C) in pasted and dropped text. These can be used to execute arbitrary commands in some shell environments. This attack requires an attacker to convince the user to copy and paste or drag and drop malicious text. The attack requires user interaction to be triggered, but the dangerous characters are invisible in most GUI environments so it isn't trivially detected, especially if the string contents are complex. Fixed in Ghostty v1.3.0.
CVE Details
CVSS v3.1 Score6.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published3/10/2026
Last Modified3/13/2026
Sourcenvd
Honeypot Sightings0
Affected Products
ghostty:ghostty
Weaknesses (CWE)
CWE-78
References
https://github.com/ghostty-org/ghostty/commit/fe7427ed2a1a02aef85495b384cfb8f11ee5efc9(security-advisories@github.com)
https://github.com/ghostty-org/ghostty/pull/10746(security-advisories@github.com)
https://github.com/ghostty-org/ghostty/security/advisories/GHSA-4jxv-xgrp-5m3r(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.