Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.233, since Tabby does not escape control characters from file paths when dragging and dropping a file into it, code execution can be achieved. This vulnerability is fixed in 1.0.233. | |
| Title | Tabby: Dragging and Dropping a File into Tabby Can Lead to Code Execution | |
| Weaknesses | CWE-150 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T18:04:54.549Z
Reserved: 2026-05-08T18:07:27.341Z
Link: CVE-2026-45038
Updated: 2026-05-15T18:00:16.976Z
Status : Received
Published: 2026-05-15T17:16:48.760
Modified: 2026-05-15T19:17:01.630
Link: CVE-2026-45038
No data.
OpenCVE Enrichment
Updated: 2026-05-15T19:00:07Z