Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 20 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 18 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local Code Execution via SSH Conductor Escape Sequences in iTerm2 |
Sat, 18 Apr 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In iTerm2 through 3.6.9, displaying a .txt file can cause code execution via DCS 2000p and OSC 135 data, if the working directory contains a malicious file whose name is valid output from the conductor encoding path, such as a pathname with an initial ace/c+ substring, aka "hypothetical in-band signaling abuse." This occurs because iTerm2 accepts the SSH conductor protocol from terminal output that does not originate from a legitimate conductor session. | |
| First Time appeared |
Iterm2
Iterm2 iterm2 |
|
| Weaknesses | CWE-829 | |
| CPEs | cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Iterm2
Iterm2 iterm2 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-20T15:52:10.357Z
Reserved: 2026-04-18T05:27:07.778Z
Link: CVE-2026-41253
Updated: 2026-04-20T15:52:06.515Z
Status : Awaiting Analysis
Published: 2026-04-18T06:16:17.427
Modified: 2026-04-20T19:05:30.750
Link: CVE-2026-41253
No data.
OpenCVE Enrichment
Updated: 2026-04-18T19:30:08Z