Description
Ghostty is a cross-platform terminal emulator. Ghostty allows control characters such as 0x03 (Ctrl+C) in pasted and dropped text. These can be used to execute arbitrary commands in some shell environments. This attack requires an attacker to convince the user to copy and paste or drag and drop malicious text. The attack requires user interaction to be triggered, but the dangerous characters are invisible in most GUI environments so it isn't trivially detected, especially if the string contents are complex. Fixed in Ghostty v1.3.0.
Published: 2026-03-09
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary command execution via user‑mediated paste or drag‑and‑drop
Action: Immediate Patch
AI Analysis

Impact

Ghostty, a cross‑platform terminal emulator, accepts control characters such as Ctrl+C (0x03) in pasted or dragged text. When these characters reach the terminal, they can trigger arbitrary command execution in any shell that interprets them, representing a CWE‑78 condition of executable code injection through improper sanitization. The flaw is user‑mediated; an attacker must first convince the user to copy or drop malicious content, and because the offending characters are invisible in most graphical interfaces, the attacker can remain undetected until the command runs, potentially compromising the user’s system.

Affected Systems

All releases of Ghostty before the patch in v1.3.0 are vulnerable. The product is the same across platforms, as Ghostty is cross‑platform; any older version installed on Windows, macOS, or Linux exposes the same issue if it processes pasted or dropped text.

Risk and Exploitability

The CVSS score of 6.3 places the issue in the medium severity range, while the EPSS score below 1% indicates a low current exploitation probability and it is not listed in the CISA KEV catalog. Nonetheless, the attack vector requires user interaction via paste or drag‑and‑drop; invisible control characters can bypass visual inspection, and once triggered an attacker can execute arbitrary commands within the shell context. The threat therefore hinges on user awareness and adequate mitigation of paste handling.

Generated by OpenCVE AI on April 16, 2026 at 10:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Ghostty to version 1.3.0 or later, which removes the vulnerable handling of control characters in pasted or dragged content.
  • If upgrading is not immediately possible, disable paste or drag‑and‑drop functionality in the terminal or configure the shell to strip or ignore control characters before execution.
  • Educate users to avoid pasting or dragging text from untrusted sources and to be aware that invisible control characters can be present in copied content.

Generated by OpenCVE AI on April 16, 2026 at 10:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Ghostty
Ghostty ghostty
CPEs cpe:2.3:a:ghostty:ghostty:*:*:*:*:*:*:*:*
Vendors & Products Ghostty
Ghostty ghostty

Tue, 10 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Ghostty-org
Ghostty-org ghostty
Vendors & Products Ghostty-org
Ghostty-org ghostty

Mon, 09 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
Description Ghostty is a cross-platform terminal emulator. Ghostty allows control characters such as 0x03 (Ctrl+C) in pasted and dropped text. These can be used to execute arbitrary commands in some shell environments. This attack requires an attacker to convince the user to copy and paste or drag and drop malicious text. The attack requires user interaction to be triggered, but the dangerous characters are invisible in most GUI environments so it isn't trivially detected, especially if the string contents are complex. Fixed in Ghostty v1.3.0.
Title Ghostty affected by arbitrary command execution via control characters in paste and drag-and-drop operations
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}


Subscriptions

Ghostty Ghostty
Ghostty-org Ghostty
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-10T15:03:53.041Z

Reserved: 2026-02-17T01:41:24.605Z

Link: CVE-2026-26982

cve-icon Vulnrichment

Updated: 2026-03-10T15:01:51.921Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T07:42:41.580

Modified: 2026-03-13T17:28:03.990

Link: CVE-2026-26982

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:15:26Z

Weaknesses