PatchSiren cyber security CVE debrief
CVE-2026-45038 Eugeny CVE debrief
CVE-2026-45038 is a high-severity Tabby vulnerability in drag-and-drop file handling. Before version 1.0.233, Tabby did not escape control characters in file paths when a file was dragged into the terminal emulator, which could result in code execution. The issue is fixed in Tabby 1.0.233. The CVE was published on 2026-05-15 and updated on 2026-05-20.
- Vendor
- Eugeny
- Product
- tabby
- CVSS
- HIGH 8.4
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-15
- Original CVE updated
- 2026-05-20
- Advisory published
- 2026-05-15
- Advisory updated
- 2026-05-20
Who should care
Organizations and users running Tabby on desktops, especially where drag-and-drop of files into the terminal is part of normal workflow. Security teams should also care because the flaw can lead to code execution from a user interaction path.
Technical summary
NVD maps the vulnerable product as tabby:tabby with affected versions ending before 1.0.233. The advisory describes a failure to escape control characters embedded in file paths during drag-and-drop handling. NVD lists CWE-150 (Improper Neutralization of Escape, Meta, or Control Sequences), and the linked vendor advisory indicates the issue can be used to achieve code execution. The provided data does not indicate KEV listing or known ransomware use.
Defensive priority
High. The vulnerability can be triggered through a common GUI interaction and may lead to code execution, so upgrading should be prioritized ahead of routine maintenance changes.
Recommended defensive actions
- Upgrade Tabby to version 1.0.233 or later as soon as practical.
- Inventory Tabby deployments and confirm the installed version is not below 1.0.233.
- Temporarily discourage drag-and-drop of untrusted files into Tabby until patched.
- Review local security guidance for terminal emulator use and user awareness around untrusted file interactions.
- Track the linked vendor advisory and NVD record for any follow-up clarifications or remediation notes.
Evidence notes
Source data shows CVE publication at 2026-05-15T17:16:48.760Z and modification at 2026-05-20T17:16:24.593Z. NVD lists the vulnerable CPE as cpe:2.3:a:tabby:tabby:* with versionEndExcluding 1.0.233. The only supplied reference is the GitHub security advisory GHSA-m937-jm93-pfp6, tagged as Exploit and Vendor Advisory. Provided enrichment marks this CVE as not in CISA KEV and does not identify ransomware use.
Official resources
-
CVE-2026-45038 CVE record
CVE.org
-
CVE-2026-45038 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Exploit, Vendor Advisory
Publicly disclosed on 2026-05-15, with a subsequent NVD update on 2026-05-20. Fixed in Tabby 1.0.233.