← Back to CVEs
CVE-2026-41253
MEDIUM6.9
Description
In iTerm2 through 3.6.9, displaying a .txt file can cause code execution via DCS 2000p and OSC 135 data, if the working directory contains a malicious file whose name is valid output from the conductor encoding path, such as a pathname with an initial ace/c+ substring, aka "hypothetical in-band signaling abuse." This occurs because iTerm2 accepts the SSH conductor protocol from terminal output that does not originate from a legitimate conductor session.
CVE Details
CVSS v3.1 Score6.9
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
Attack VectorLOCAL
ComplexityHIGH
Privileges RequiredNONE
User InteractionNONE
Published4/18/2026
Last Modified4/20/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-829
References
https://blog.calif.io/p/mad-bugs-even-cat-readmetxt-is-not(cve@mitre.org)
https://iterm2.com/downloads.html(cve@mitre.org)
https://news.ycombinator.com/item?id=47809190(cve@mitre.org)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.