Upstream information

CVE-2026-26982 at MITRE

Description

Ghostty is a cross-platform terminal emulator. Ghostty allows control characters such as 0x03 (Ctrl+C) in pasted and dropped text. These can be used to execute arbitrary commands in some shell environments. This attack requires an attacker to convince the user to copy and paste or drag and drop malicious text. The attack requires user interaction to be triggered, but the dangerous characters are invisible in most GUI environments so it isn't trivially detected, especially if the string contents are complex. Fixed in Ghostty v1.3.0.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v3 Scores
CVSS detail CNA (GitHub) National Vulnerability Database
Base Score 6.3 8.8
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector Network Network
Attack Complexity Low Low
Privileges Required None None
User Interaction Required Required
Scope Unchanged Unchanged
Confidentiality Impact Low High
Integrity Impact Low High
Availability Impact Low High
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entry: 1259440 [RESOLVED / FIXED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • ghostty >= 1.3.0-1.1
  • ghostty-bash-completion >= 1.3.0-1.1
  • ghostty-devel >= 1.3.0-1.1
  • ghostty-doc >= 1.3.0-1.1
  • ghostty-fish-completion >= 1.3.0-1.1
  • ghostty-lang >= 1.3.0-1.1
  • ghostty-neovim >= 1.3.0-1.1
  • ghostty-nushell-completion >= 1.3.0-1.1
  • ghostty-vim >= 1.3.0-1.1
  • ghostty-zsh-completion >= 1.3.0-1.1
  • libghostty-vt0 >= 1.3.0-1.1
  • nautilus-extension-ghostty >= 1.3.0-1.1
  • terminfo-ghostty >= 1.3.0-1.1
Patchnames:
openSUSE-Tumbleweed-2026-10316


SUSE Timeline for this CVE

CVE page created: Tue Mar 10 10:00:45 2026
CVE page last modified: Thu Mar 19 18:53:44 2026