Browse all 3 CVE security advisories affecting iTerm2. AI-powered Chinese analysis, POCs, and references for each vulnerability.
iTerm2 serves as a terminal emulator for macOS, primarily used for command-line interface access and shell integration. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and insecure handling of external data. While no major security incidents have been widely documented, the three CVEs on record highlight potential risks in its rendering engine and protocol handling. The application's extensive feature set, including scripting capabilities and session management, introduces multiple attack surfaces that require careful configuration to mitigate potential exploitation risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-41253 | iTerm2 安全漏洞 — iTerm2CWE-829 | 6.9 | Medium | 2026-04-18 |
| CVE-2025-22275 | iTerm2 安全漏洞 — iTerm2CWE-532 | 9.3 | Critical | 2025-01-03 |
| CVE-2019-9535 | iTerm2, up to and including version 3.3.5, with tmux integration is vulnerable to remote command execution — iTerm2CWE-349 | 9.8 | - | 2019-10-09 |
This page lists every published CVE security advisory associated with iTerm2. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.