Description
Vim is an open source, command line text editor. Prior to 9.2.0479, a command injection vulnerability exists in tar#Vimuntar() in
runtime/autoload/tar.vim when decompressing .tgz archives on Unix-like systems. The function builds :!gunzip and :!gzip -d commands using shellescape(tartail) without the {special} flag, allowing a crafted archive filename to trigger Vim cmdline-special expansion and execute shell commands in the user's context. This vulnerability is fixed in 9.2.0479.
Published: 2026-05-15
Score: 3.6 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the tar#Vimuntar() function of Vim’s runtime autoload tar.vim, which builds shell commands without using the {special} flag for shellescape. A crafted .tgz archive filename can trigger Vim’s cmdline‑special expansion and allow execution of arbitrary shell commands in the user’s context. This constitutes a command‑line injection weakness (CWE‑78) and a shell‑execution flaw (CWE‑88). The CVSS score of 3.6 indicates moderate severity, reflecting that exploitation requires local user interaction and results in code execution with the victim’s privileges.

Affected Systems

All Vim users running versions before 9.2.0479 on Unix‑like operating systems are affected, as the issue exists in the tar.vim script bundled with those releases. The vulnerability is resolved in Vim 9.2.0479 and later. No specific operating‑system versions are limited; the flaw is tied solely to the Vim release.

Risk and Exploitability

The risk localized to systems where an attacker can place a malicious .tgz file and persuade a user to open it in Vim. The absence of an EPSS score and the lack of listing in CISA’s KEV catalogue suggest the exploit is not yet widespread. Nonetheless, the CVSS score of 3.6 and the fact that the exploit requires only local user interaction mean that an unpatched user could execute arbitrary commands. No external attack vector beyond local file handling is documented in the description.

Generated by OpenCVE AI on May 15, 2026 at 16:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vim to version 9.2.0479 or newer.
  • Until the upgrade is applied, avoid opening or extracting .tgz archives in Vim or restrict usage to trusted users.
  • Use a dedicated tool such as tar or gunzip to extract archives instead of the Vim function.

Generated by OpenCVE AI on May 15, 2026 at 16:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Vim
Vim vim
Vendors & Products Vim
Vim vim

Fri, 15 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description Vim is an open source, command line text editor. Prior to 9.2.0479, a command injection vulnerability exists in tar#Vimuntar() in runtime/autoload/tar.vim when decompressing .tgz archives on Unix-like systems. The function builds :!gunzip and :!gzip -d commands using shellescape(tartail) without the {special} flag, allowing a crafted archive filename to trigger Vim cmdline-special expansion and execute shell commands in the user's context. This vulnerability is fixed in 9.2.0479.
Title Vim: Command injection in tar#Vimuntar via missing shellescape {special} flag
Weaknesses CWE-78
CWE-88
References
Metrics cvssV3_1

{'score': 3.6, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T15:57:39.053Z

Reserved: 2026-05-14T18:06:06.810Z

Link: CVE-2026-46483

cve-icon Vulnrichment

Updated: 2026-05-15T15:57:30.004Z

cve-icon NVD

Status : Received

Published: 2026-05-15T15:16:54.237

Modified: 2026-05-15T15:16:54.237

Link: CVE-2026-46483

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T16:30:03Z

Weaknesses