getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1871-1 | vim security update |
Debian DSA |
DSA-4467-1 | vim security update |
Debian DSA |
DSA-4467-2 | vim regression update |
Debian DSA |
DSA-4487-1 | neovim security update |
Ubuntu USN |
USN-4016-1 | Vim vulnerabilities |
Ubuntu USN |
USN-4016-2 | Neovim vulnerability |
Ubuntu USN |
USN-4862-1 | Neovim vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 11 Nov 2025 17:00:00 +0000
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-11T16:50:16.838Z
Reserved: 2019-06-05T00:00:00.000Z
Link: CVE-2019-12735
No data.
Status : Modified
Published: 2019-06-05T14:29:11.387
Modified: 2025-11-11T17:15:34.740
Link: CVE-2019-12735
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN