Description
Vim is an open source, command line text editor. Prior to version 9.2.0078, a stack-buffer-overflow occurs in `build_stl_str_hl()` when rendering a statusline with a multi-byte fill character on a very wide terminal. Version 9.2.0078 patches the issue.
Published: 2026-02-27
Score: 2.2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Stack Buffer Overflow in statusline rendering
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stack-buffer-overflow triggered inside the build_stl_str_hl() routine of Vim when a statusline containing a multi-byte fill character is rendered on a terminal that is very wide. The overflow can corrupt the call stack and potentially allow an attacker to execute arbitrary code, compromising the confidentiality and integrity of the system. The weakness is a classic stack-based buffer overflow.

Affected Systems

Vim 9.2 and earlier versions before 9.2.0078 are affected. The issue is documented for the Vim editor, a widely used open‑source command‑line text editor, across all platforms where it is distributed.

Risk and Exploitability

The CVSS score is 2.2, indicating low severity, and the EPSS score is below 1%, suggesting a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is local and requires an attacker to trigger the rendering of a specially crafted statusline in a terminal session where the terminal width is large enough to exploit the overflow. No remote exploitation vector is described, so the risk to users who do not alter statusline settings or use wide terminals remains low.

Generated by OpenCVE AI on April 16, 2026 at 15:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vim to version 9.2.0078 or newer, which contains the fix.
  • If an upgrade is not immediately possible, avoid using multi‑byte statusline fill characters or reduce terminal width until the patch is applied.
  • Stay informed of further advisories and apply future patches to Vim as they become available.

Generated by OpenCVE AI on April 16, 2026 at 15:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*

Mon, 02 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Vim
Vim vim
Vendors & Products Vim
Vim vim

Sat, 28 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-135
References
Metrics threat_severity

None

threat_severity

Low


Sat, 28 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
References

Fri, 27 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Description Vim is an open source, command line text editor. Prior to version 9.2.0078, a stack-buffer-overflow occurs in `build_stl_str_hl()` when rendering a statusline with a multi-byte fill character on a very wide terminal. Version 9.2.0078 patches the issue.
Title Vim has stack-buffer-overflow in build_stl_str_hl()
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 2.2, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-02T21:45:53.806Z

Reserved: 2026-02-27T15:54:05.136Z

Link: CVE-2026-28422

cve-icon Vulnrichment

Updated: 2026-02-28T00:15:38.152Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T22:16:25.667

Modified: 2026-03-04T20:44:22.990

Link: CVE-2026-28422

cve-icon Redhat

Severity : Low

Publid Date: 2026-02-27T22:08:11Z

Links: CVE-2026-28422 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:15:39Z

Weaknesses