Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. String fields from eBPF events in columns output mode are rendered to the terminal without any sanitization of control characters or ANSI escape sequences. Therefore, a maliciously forged – partially or completely – event payload, coming from an observed container, might inject the escape sequences into the terminal of ig operators, with various effects. The columns output mode is the default when running ig run interactively.
Metrics
Affected Vendors & Products
References
History
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Inspektor-gadget
Inspektor-gadget inspektor-gadget |
|
| Vendors & Products |
Inspektor-gadget
Inspektor-gadget inspektor-gadget |
Thu, 12 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. String fields from eBPF events in columns output mode are rendered to the terminal without any sanitization of control characters or ANSI escape sequences. Therefore, a maliciously forged – partially or completely – event payload, coming from an observed container, might inject the escape sequences into the terminal of ig operators, with various effects. The columns output mode is the default when running ig run interactively. | |
| Title | Inspektor Gadget uses unsanitized ANSI Escape Sequences In `columns` Output Mode | |
| Weaknesses | CWE-150 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-02-12T20:06:58.709Z
Updated: 2026-02-12T20:57:00.522Z
Reserved: 2026-02-09T17:41:55.859Z
Link: CVE-2026-25996
Updated: 2026-02-12T20:56:45.784Z
Status : Awaiting Analysis
Published: 2026-02-12T21:16:02.820
Modified: 2026-02-13T14:23:48.007
Link: CVE-2026-25996
No data.