In iTerm2 through 3.6.9, displaying a .txt file can cause code execution via DCS 2000p and OSC 135 data, if the working directory contains a malicious file whose name is valid output from the conductor encoding path, such as a pathname with an initial ace/c+ substring, aka "hypothetical in-band signaling abuse." This occurs because iTerm2 accepts the SSH conductor protocol from terminal output that does not originate from a legitimate conductor session.
History

Mon, 20 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 18 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Title Local Code Execution via SSH Conductor Escape Sequences in iTerm2

Sat, 18 Apr 2026 06:00:00 +0000

Type Values Removed Values Added
Description In iTerm2 through 3.6.9, displaying a .txt file can cause code execution via DCS 2000p and OSC 135 data, if the working directory contains a malicious file whose name is valid output from the conductor encoding path, such as a pathname with an initial ace/c+ substring, aka "hypothetical in-band signaling abuse." This occurs because iTerm2 accepts the SSH conductor protocol from terminal output that does not originate from a legitimate conductor session.
First Time appeared Iterm2
Iterm2 iterm2
Weaknesses CWE-829
CPEs cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*
Vendors & Products Iterm2
Iterm2 iterm2
References
Metrics cvssV3_1

{'score': 6.9, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-04-18T05:27:08.202Z

Updated: 2026-04-20T15:52:10.357Z

Reserved: 2026-04-18T05:27:07.778Z

Link: CVE-2026-41253

cve-icon Vulnrichment

Updated: 2026-04-20T15:52:06.515Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-18T06:16:17.427

Modified: 2026-04-20T19:05:30.750

Link: CVE-2026-41253

cve-icon Redhat

No data.