Home

Description

Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.232, Tabby's terminal linkifier passes any detected URI directly to the operating system's protocol handler without validating the protocol scheme. This allows a malicious SSH or Telnet server to send crafted terminal output containing dangerous protocol URIs which Tabby renders as clickable links, triggering arbitrary OS protocol handlers on the victim's machine. This vulnerability is fixed in 1.0.232.

PUBLISHED Reserved 2026-05-08 | Published 2026-05-15 | Updated 2026-05-15 | Assigner GitHub_M




HIGH: 7.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

Problem types

CWE-184: Incomplete List of Disallowed Inputs

CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Product status

< 1.0.232
affected

References

github.com/.../tabby/security/advisories/GHSA-cmpc-v2x9-j9x9

cve.org (CVE-2026-45037)

nvd.nist.gov (CVE-2026-45037)

Download JSON