In iTerm2 through 3.6.9, displaying a .txt file can cause code execution via DCS 2000p and OSC 135 data, if the working directory contains a malicious file whose name is valid output from the conductor encoding path, such as a pathname with an initial ace/c+ substring, aka "hypothetical in-band signaling abuse." This occurs because iTerm2 accepts the SSH conductor protocol from terminal output that does not originate from a legitimate conductor session.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 18 Apr 2026 06:00:00 +0000

Type Values Removed Values Added
Description In iTerm2 through 3.6.9, displaying a .txt file can cause code execution via DCS 2000p and OSC 135 data, if the working directory contains a malicious file whose name is valid output from the conductor encoding path, such as a pathname with an initial ace/c+ substring, aka "hypothetical in-band signaling abuse." This occurs because iTerm2 accepts the SSH conductor protocol from terminal output that does not originate from a legitimate conductor session.
First Time appeared Iterm2
Iterm2 iterm2
Weaknesses CWE-829
CPEs cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*
Vendors & Products Iterm2
Iterm2 iterm2
References
Metrics cvssV3_1

{'score': 6.9, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-18T05:32:12.583Z

Reserved: 2026-04-18T05:27:07.778Z

Link: CVE-2026-41253

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-18T06:16:17.427

Modified: 2026-04-18T06:16:17.427

Link: CVE-2026-41253

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:00:05Z

Weaknesses