GHSA-wjpc-4f29-83h3

Suggest an improvement
Source
https://github.com/advisories/GHSA-wjpc-4f29-83h3
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-wjpc-4f29-83h3/GHSA-wjpc-4f29-83h3.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wjpc-4f29-83h3
Aliases
Published
2026-01-05T19:42:12Z
Modified
2026-02-03T03:13:44.142817Z
Severity
  • 2.0 (Low) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P CVSS Calculator
Summary
badkeys vulnerable to ASCII control character injection on console via malformed input
Details

Impact

An attacker may inject content with ASCII control characters like vertical tabs, ANSI escape sequences, etc., that can create misleading output of the badkeys command-line tool. This impacts scanning DKIM keys (both --dkim and --dkim-dns), SSH keys (--ssh-lines mode), and filenames in various modes.

Patches

This has been fixed with the following commits: https://github.com/badkeys/badkeys/commit/de631f69f040974bb5fb442cdab9a1d904c64087 https://github.com/badkeys/badkeys/commit/635a2f3b1b50a895d8b09ec8629efc06189f349a

All users should upgrade badkeys to version 0.0.16.

Resources

https://github.com/badkeys/badkeys/issues/40

Database specific
{
    "severity": "LOW",
    "nvd_published_at": "2026-01-06T00:15:49Z",
    "github_reviewed_at": "2026-01-05T19:42:12Z",
    "cwe_ids": [
        "CWE-150"
    ],
    "github_reviewed": true
}
References

Affected packages

PyPI / badkeys

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.16

Affected versions

0.*
0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6
0.0.7
0.0.8
0.0.9
0.0.10
0.0.11
0.0.12
0.0.13
0.0.14
0.0.15

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-wjpc-4f29-83h3/GHSA-wjpc-4f29-83h3.json"
last_known_affected_version_range
"<= 0.0.15"