Unrated severityNVD Advisory· Published Mar 9, 2026· Updated Mar 10, 2026
Ghostty affected by arbitrary command execution via control characters in paste and drag-and-drop operations
CVE-2026-26982
Description
Ghostty is a cross-platform terminal emulator. Ghostty allows control characters such as 0x03 (Ctrl+C) in pasted and dropped text. These can be used to execute arbitrary commands in some shell environments. This attack requires an attacker to convince the user to copy and paste or drag and drop malicious text. The attack requires user interaction to be triggered, but the dangerous characters are invisible in most GUI environments so it isn't trivially detected, especially if the string contents are complex. Fixed in Ghostty v1.3.0.
Affected products
2- Range: <1.3.0
- ghostty-org/ghosttyv5Range: < 1.3.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/ghostty-org/ghostty/commit/fe7427ed2a1a02aef85495b384cfb8f11ee5efc9mitrex_refsource_MISC
- github.com/ghostty-org/ghostty/pull/10746mitrex_refsource_MISC
- github.com/ghostty-org/ghostty/security/advisories/GHSA-4jxv-xgrp-5m3rmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.