Impact
A modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a specially crafted file. The missing P_MLE flag in several options enables the modeline to run commands. In addition, mapset() can be abused by sandboxed expressions. The vulnerability is a classic command injection flaw (CWE‑78) that can compromise confidentiality, integrity, and availability by allowing an attacker to run system commands with the privileges of the Vim process.
Affected Systems
The flaw affects the open‑source Vim text editor, specifically all releases older than 9.2.0276. Users of Vim 9.2.0275 and earlier are susceptible. The vulnerability is present in the main Vim distribution (vim:vim) and any derivative that has not applied the patch from commit 75661a66a1db1e1f3f1245c615.
Risk and Exploitability
The CVSS score of 8.2 reflects high severity. The EPSS score is not reported, but the vulnerability is not listed in CISA's KEV catalog, indicating no known widespread exploitation. The likely attack vector is local or when an attacker can prompt a user to open a crafted file, such as through a shared drive or email attachment. Exploitation requires no special permissions beyond the victim’s Vim session, making it an attractive target for attackers seeking privilege escalation on a compromised machine.
OpenCVE Enrichment