Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26982: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ghostty-org ghostty

0
Medium
VulnerabilityCVE-2026-26982cvecve-2026-26982cwe-78
Published: Mon Mar 09 2026 (03/09/2026, 21:14:27 UTC)
Source: CVE Database V5
Vendor/Project: ghostty-org
Product: ghostty

Description

Ghostty is a cross-platform terminal emulator. Ghostty allows control characters such as 0x03 (Ctrl+C) in pasted and dropped text. These can be used to execute arbitrary commands in some shell environments. This attack requires an attacker to convince the user to copy and paste or drag and drop malicious text. The attack requires user interaction to be triggered, but the dangerous characters are invisible in most GUI environments so it isn't trivially detected, especially if the string contents are complex. Fixed in Ghostty v1.3.0.

AI-Powered Analysis

AILast updated: 03/09/2026, 21:34:26 UTC

Technical Analysis

CVE-2026-26982 is a medium-severity OS command injection vulnerability affecting Ghostty, a cross-platform terminal emulator, in versions before 1.3.0. The root cause is the improper neutralization of special control characters (notably 0x03, Ctrl+C) in pasted or drag-and-dropped text. These control characters can be interpreted by certain shell environments to execute arbitrary commands, allowing an attacker to run code on the victim's system. The attack vector requires social engineering to convince a user to paste or drop crafted text containing these invisible control characters. Because these characters are not visually apparent in most graphical user interfaces, users may not detect the malicious input. The vulnerability impacts confidentiality, integrity, and availability by enabling command execution. The vulnerability was publicly disclosed on March 9, 2026, with no known exploits in the wild. The Ghostty development team addressed the issue in version 1.3.0 by properly sanitizing or blocking dangerous control characters in user input. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) indicates network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, and low impact on confidentiality, integrity, and availability individually but combined to medium overall severity.

Potential Impact

If exploited, this vulnerability allows attackers to execute arbitrary OS commands on the victim's machine via the Ghostty terminal emulator. This can lead to unauthorized data disclosure, modification, or deletion, and potentially full system compromise depending on the commands executed and the privileges of the Ghostty process. Because the attack requires user interaction (pasting or dropping malicious text), the risk is somewhat mitigated but remains significant in environments where users frequently handle untrusted text or code snippets. Organizations using Ghostty in development, operations, or security contexts may face risks of data breaches, operational disruption, or lateral movement within networks. The stealthy nature of the attack—due to invisible control characters—makes detection difficult, increasing the likelihood of successful exploitation. The vulnerability affects all platforms supported by Ghostty, potentially impacting diverse environments globally.

Mitigation Recommendations

The primary mitigation is to upgrade Ghostty to version 1.3.0 or later, where the vulnerability is fixed. Until upgrade, organizations should implement strict user education and awareness programs to prevent users from pasting or dropping untrusted or suspicious text into Ghostty. Employ endpoint security solutions capable of detecting anomalous command execution or suspicious terminal activity. Consider restricting the use of Ghostty to trusted users or environments and monitor logs for unusual command patterns. Additionally, sandboxing or running Ghostty with least privilege can limit the impact of potential exploitation. Developers and administrators should audit other terminal emulators or similar tools for similar input sanitization issues. Implementing input validation and sanitization at the application level is critical to prevent injection attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T01:41:24.605Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69af3955ea502d3aa8c59c7b

Added to database: 3/9/2026, 9:19:17 PM

Last enriched: 3/9/2026, 9:34:26 PM

Last updated: 3/12/2026, 3:43:02 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses