CVE-2026-25996

Source
https://cve.org/CVERecord?id=CVE-2026-25996
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25996.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25996
Aliases
  • GHSA-34r5-6j7w-235f
Published
2026-02-12T20:06:58.709Z
Modified
2026-02-25T00:36:42.722146Z
Severity
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Inspektor Gadget uses unsanitized ANSI Escape Sequences In `columns` Output Mode
Details

Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. String fields from eBPF events in columns output mode are rendered to the terminal without any sanitization of control characters or ANSI escape sequences. Therefore, a maliciously forged – partially or completely – event payload, coming from an observed container, might inject the escape sequences into the terminal of ig operators, with various effects. The columns output mode is the default when running ig run interactively.

Database specific
{
    "cwe_ids": [
        "CWE-150"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25996.json"
}
References

Affected packages

Git / github.com/inspektor-gadget/inspektor-gadget

Affected ranges

Type
GIT
Repo
https://github.com/inspektor-gadget/inspektor-gadget
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.1.0
v0.1.0-alpha.1
v0.1.0-alpha.2
v0.1.0-alpha.3
v0.1.0-alpha.4
v0.1.0-alpha.5
v0.10.0
v0.11.0
v0.11.0-rc
v0.12.0
v0.12.0-rc
v0.12.1
v0.13.0
v0.13.0-rc
v0.14.0
v0.14.0-rc
v0.15.0
v0.15.0-rc
v0.16.0
v0.16.0-rc
v0.16.1
v0.17.0
v0.18.0
v0.18.1
v0.19.0
v0.2.0
v0.2.1
v0.20.0
v0.21.0
v0.22.0
v0.23.0
v0.23.1
v0.24.0
v0.25.0
v0.26.0
v0.27.0
v0.28.0
v0.29.0
v0.3.0
v0.3.1
v0.30.0
v0.31.0
v0.32.0
v0.33.0
v0.34.0
v0.35.0
v0.36.0
v0.37.0
v0.38.0
v0.39.0
v0.4.0
v0.4.1
v0.4.2
v0.40.0
v0.41.0
v0.42.0
v0.43.0
v0.44.0
v0.45.0
v0.46.0
v0.47.0
v0.48.0
v0.49.0
v0.5.0
v0.5.1
v0.6.0
v0.7.0
v0.7.1
v0.8.0
v0.9.0
v0.9.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25996.json"