Description
Vim is an open source, command line text editor. Prior to 9.2.0357, A command injection vulnerability exists in Vim's tag file processing. When resolving a tag, the filename field from the tags file is passed through wildcard expansion to resolve environment variables and wildcards. If the filename field contains backtick syntax (e.g., `command`), Vim executes the embedded command via the system shell with the full privileges of the running user.
Published: 2026-04-24
Score: 6.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Command Execution
Action: Apply Patch
AI Analysis

Impact

Vim processes tag files used to navigate code. In versions prior to 9.2.0357, the filename field from a tag entry undergoes wildcard expansion, which allows backtick syntax (e.g., `command`) to be interpreted and executed by the underlying shell. This flaw falls under CWE‑78 and results in arbitrary command execution with the privileges of the user running Vim.

Affected Systems

All installations of Vim supplied by the Vim project, specifically any releases before 9.2.0357. The vulnerability is exploitable on any system where a user has read access to a tags file they can influence or where a malicious tag file is introduced.

Risk and Exploitability

The CVSS score of 6.6 indicates moderate severity. The EPSS score (<1%) suggests low current exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires local access and the ability to craft or modify a tags file; it does not provide network‑level intrusion. Given its local execution nature, the risk is confined to the privileges of the Vim user. Potential attackers could gain confidentiality, integrity, or availability by running arbitrary commands on the host.

Generated by OpenCVE AI on April 28, 2026 at 13:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vim to version 9.2.0357 or later, which removes backtick handling from tag filenames.
  • If an upgrade is not immediately possible, ensure that tags files are not writable by untrusted users and consider restricting the Vim environment using the 'secure' mode (set secure) to limit shell command execution.
  • Regularly review and sanitize tags files in shared or multi‑user environments, and monitor for unexpected entries containing backticks.

Generated by OpenCVE AI on April 28, 2026 at 13:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 28 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Vim
Vim vim
CPEs cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
Vendors & Products Vim
Vim vim

Fri, 24 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Description Vim is an open source, command line text editor. Prior to 9.2.0357, A command injection vulnerability exists in Vim's tag file processing. When resolving a tag, the filename field from the tags file is passed through wildcard expansion to resolve environment variables and wildcards. If the filename field contains backtick syntax (e.g., `command`), Vim executes the embedded command via the system shell with the full privileges of the running user.
Title Vim: Command injection via backtick expansion in tag filenames
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-28T12:50:03.048Z

Reserved: 2026-04-20T15:32:33.812Z

Link: CVE-2026-41411

cve-icon Vulnrichment

Updated: 2026-04-24T17:44:01.881Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T17:16:22.037

Modified: 2026-04-27T13:39:23.250

Link: CVE-2026-41411

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-24T16:51:39Z

Links: CVE-2026-41411 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T13:45:06Z

Weaknesses