CVE-2026-26982

6.3 MEDIUM

📋 TL;DR

Ghostty terminal emulator versions before 1.3.0 allow control characters like Ctrl+C in pasted/dropped text, which can execute arbitrary commands in some shell environments. Attackers can craft malicious text that appears normal but contains invisible control characters, requiring user interaction via copy-paste or drag-drop. This affects all Ghostty users on vulnerable versions across platforms.

💻 Affected Systems

Products:
  • Ghostty
Versions: All versions before 1.3.0
Operating Systems: Cross-platform (Linux, macOS, Windows)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Requires user interaction via copy-paste or drag-drop of malicious text.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary command execution with user privileges, potentially leading to data theft, malware installation, or lateral movement.

🟠

Likely Case

Limited command execution in user's shell context, potentially stealing session data, modifying files, or launching further attacks.

🟢

If Mitigated

No impact if patched or workarounds applied; otherwise limited to user's privilege level with proper security controls.

🌐 Internet-Facing: LOW - Requires direct user interaction with malicious content, not remotely exploitable.
🏢 Internal Only: MEDIUM - Social engineering attacks could trick users into pasting malicious text, especially in shared environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to convince user to copy/paste malicious text. No authentication needed as it targets the user's active session.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.3.0

Vendor Advisory: https://github.com/ghostty-org/ghostty/security/advisories/GHSA-4jxv-xgrp-5m3r

Restart Required: Yes

Instructions:

1. Update Ghostty to version 1.3.0 or later. 2. Restart Ghostty terminal. 3. Verify version with 'ghostty --version'.

🔧 Temporary Workarounds

Disable paste/drop execution

all

Configure shell to not execute commands from pasted text containing control characters

For bash: set -o ignoreeof
For zsh: setopt ignore_eof

Use alternative terminal

all

Temporarily switch to another terminal emulator until patched

🧯 If You Can't Patch

  • Train users to avoid copying/pasting untrusted text into terminal
  • Implement application allowlisting to prevent unauthorized terminal usage

🔍 How to Verify

Check if Vulnerable:

Check Ghostty version: if below 1.3.0, system is vulnerable

Check Version:

ghostty --version

Verify Fix Applied:

Run 'ghostty --version' and confirm version is 1.3.0 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unexpected command execution following paste/drop operations
  • Shell history showing commands with control characters

Network Indicators:

  • Outbound connections following paste operations without user intent

SIEM Query:

Process creation where parent process is ghostty and command contains control characters

🔗 References

📤 Share & Export